Invisible Identity, or How to Delight People & Secure Users

So I waited patiently for the folks at the Cloud Identity Summit to publish on their Youtube channel the talk I gave earlier this year on Invisible Identity. But it never came. Turns out that a few session recordings got messed up, and unfortunately mine was among them. I sense Paul Madsen’s hand in this….

The post Invisible Identity, or How to Delight People & Secure Users appeared first on Talking Identity | Nishant Kaushik’s Look at the World of Identity Management.

Continue reading Invisible Identity, or How to Delight People & Secure Users

Software Monitoring for NERC CIP: What, Why and How – Part 1

The momentous NERC CIP v5 deadline of July 1 is now behind us. Considerable work has been done by all NERC registered entities, but there is still considerable work ahead. Some entities are still working on implementing or automating required controls. On top of that effort, the time bound process requirements (e.g. review X every Y […]… Read More

The post Software Monitoring for NERC CIP: What, Why and How – Part 1 appeared first on The State of Security.

Continue reading Software Monitoring for NERC CIP: What, Why and How – Part 1

Privacy in the World of Invisible Identity

In part 1 of my blog post expanding on my Cloud Identity Summit talk on Invisible Identity, I proposed ‘The 4 Core Principles of Invisible Identity‘ that ensure that security and usability stay in a symbiotic partnership for an organization. I believe that adopting the concept of Invisible Identity will be vital to securing people in the…

The post Privacy in the World of Invisible Identity appeared first on Talking Identity | Nishant Kaushik’s Look at the World of Identity Management.

Continue reading Privacy in the World of Invisible Identity