A selection of curated links relating to user login and authentication security controls and threat counter measures.
Do we need a "Chief Identity Officer"? What might drive the need for this and can existing business operating models satisfy the need for identity centric metrics?
Identity and Access Management has long been confined to two (or maybe three) buckets: B2E (employee […]
On January 26th, the US Government issued a memorandum, relating to the adoption of zero trust […]