As we approach the end of 2020 (finally!) and reflect on the last 364 days, I think it is safe to say that everyone shares this same perspective – it was truly a year like no other. And while most every aspect of our personal lives was turned upside down; this year also represented a…
Archives
-
The Implications of Bring Your Own Identity
When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to…
-
Mission Possible: Better Identity Through Public/Private Sector Collaboration
One of the most entertaining parts of the Mission Impossible movies is watching the characters don masks of targets they want to impersonate and slip into and out of the secret identities like gloves. In the digital world, impersonating people is much simpler. Thankfully, government officials and the consumers they represent appear to want to change that. In…
-
Identity-Centric Security Empowers Businesses
Between the explosive growth of enterprise mobility and the increased adoption of cloud services, the number of workforce identities has skyrocketed. Accompanying that increase is a sobering statistic: according to a recent survey by the Identity Defined Security Alliance (IDSA), 79% of security and identity professionals say their company has experienced an identity-related breach in…
-
NIST SP 800-207 – Zero Trust Architecture – Finalized with More Emphasis on Identity
Last week, the National Institute of Standards and Technology (NIST) published its guidance for implementing a Zero Trust architecture, SP 800-207. This latest publication consolidates industry input received on previous draft versions of the architecture. As part of IDSA’s mission to promote identity-centric security, we provided feedback to NIST and are pleased to see some of our recommendations…
-
The Language of Identity: Bringing Everyone Together
Everyone in computer science understands the importance of standardized programming languages, and yet, in conversations between security practitioners and IT infrastructure managers about identity, much seems to get lost in translation. Terms like authorization and authentication are often used interchangeably, but also have distinct meanings to different people. Say authentication to a security person, and…