Let’s be honest — nobody wakes up excited to read documentation.
You’ve been there. You’re configuring a tricky workflow, testing an API, troubleshooting a weird corner case. And instead of finding the answer fast, you’re 12 tabs deep, elbows…
Let’s be honest — nobody wakes up excited to read documentation.
You’ve been there. You’re configuring a tricky workflow, testing an API, troubleshooting a weird corner case. And instead of finding the answer fast, you’re 12 tabs deep, elbows…
It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin by defining the functional pillars…
After the second terrorist attack in about two weeks in the UK, Prime Minister Theresa May claimed that the Internet needs regulating, and is a safe space for terrorists following on from the attack June 3rd. This got me thinking. Part of me feels this…
By Peter Boyle, Chief Technology Officer, Burning Tree
Burning Tree were at the Gartner IAM Show on 6 March, meeting with information security professionals and keeping abreast of innovation in the sector. Peter Boyle, Burning Tree’s CTO caught up with…
We held our third One Identity user conference during the first week of April in Lisbon Portugal. This informative and interactive event is held twice a year with venues alternating between Europe and the North America. This time, it was Europe’s turn…
We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.
Core Technology Systems (UK) Limited help organisations large and small to achieve their…
I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…
I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.
…There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…
“The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.
Cloud and SaaS offerings affect businesses in the reduced…
Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…
Exhibit A: Teacher gave me an overview of my child’s theory on school.
My 5 year old started kindergarten at public school this week. It’s not a huge difference for her – she’s attended daycare, preschool, pre-k for the last few years.…
Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…