Archive For December, 2012
- December 31, 2012 //
- Gary Thompson
A year of identity management innovation. Should old acquaintance be forgot, and never brought to mind? Should old acquaintance be forgot, and old lang syne? Yes, it’s hard to believe…read more →
A year of identity management innovation. Should old acquaintance be forgot, and never brought to mind? Should old acquaintance be forgot, and old lang syne? Yes, it’s hard to believe…read more →
- December 27, 2012 //
- Ryan Ward
Reach for SaaS cyber security. While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern over security of software-as-a-service (SaaS)…read more →
Reach for SaaS cyber security. While attending various conferences, roundtables and other information security gatherings, a common theme that often presents itself is the concern over security of software-as-a-service (SaaS)…read more →
ISSA IT security experts gather. I recently attended my local ISSA chapter meeting, and there were some key takeaways relating to successful cyber security management practices amongst the group. In…read more →
Top holiday cyber security hacks. Here we are, one year older and one year wiser when it comes to cyber security software, but unfortunately it seems those who mean to…read more →
Cyber security threats shut out. In today’s age of IT cyber security threats, there are always new risks that need to be monitored and accounted for, but all of the…read more →
Group management software knockout. Former boxing champion Manny Pacquiao found out last weekend in his bout with Juan Manuel Marquez that it takes just one blow to bring positive plans…read more →
Gartner Identity and Access Management insights. It was quite a week in Las Vegas for the annual Gartner Identity and Access Management (IAM) Summit. While Avatier may not have been…read more →
- December 4, 2012 //
- Gary Thompson
Identity and access management lockout. Webster’s defines “holistic” as “relating to or concerned with wholes or with complete systems rather than with the analysis of, treatment of, or dissection into…read more →
Identity and access management lockout. Webster’s defines “holistic” as “relating to or concerned with wholes or with complete systems rather than with the analysis of, treatment of, or dissection into…read more →