Five Takeaways from the Gartner IAM Summit — 2024

The Gartner IAM summit has evolved from its raucous early years at the Park Plaza Westminster. For someone like me, who has spent the full two days at the conference this year, after almost five years, it was a useful investment. I could notice some differences, in that the sessions were less individualistic, coached, orchestrated […]

Five Takeaways from the Gartner IAM Summit — 2024 Read More »

Enterprise Identity Management and the Data Conundrum

As a security professional specialising in Identity Management, I have often been floored by the hierarchical and arcane construct within which Enterprise access entitlement data is used. Before we dig deeper into this, however, a couple of terms need explaining. First off, Identity data can be used to derive information about the individual whereas entitlement

Enterprise Identity Management and the Data Conundrum Read More »

Authentication tales, Passwordless, the Spartans, and the Persians.

Authentication start-ups are like the Spartans of yore within the Identity Management world. Brave, swashbuckling, shining ambition, lithe presence and designed ostensibly for every little battle use case one can think of – that is, until you throw them against a moderately complex enterprise use case. Like Humpty Dumpty, how they all fall down! I am

Authentication tales, Passwordless, the Spartans, and the Persians. Read More »

Scroll to Top