by Gary Rowe | Feb 1, 2019 | Cybersecurity, Identity
The combination of a largely disappearing perimeter, increased enterprise security threats, expanding threat surfaces and escalating damages resulting from breaches supports stronger overall security measures including more pervasive inspection of everything. This is...
by Gary Rowe | Mar 7, 2018 | Research and Advisory Services
We are in the midst of a technological change as big as the industrial revolution when it brought us steam power and electricity. IT is becoming mobile, and digitization is affecting all industries, the public sector, and society as a whole. Thirty years ago, there...
by Gary Rowe | Sep 25, 2017 | Cybersecurity, Identity
Most breaches start with compromised identity and compromising identity is much easier with free-flowing Personally Identifiable Information (PII). So, could breaches supported by access to sensitive PII be reduced by foundational shift from monolithic database...
by Gary Rowe | Jul 18, 2017 | Identity
Successful digital transformation requires a robust, adaptive, scalable and secure means of collecting, managing, authenticating, provisioning and leveraging digital identities in support of a wide range of applications and use cases. The right Identity and Access...
by Gary Rowe | Apr 9, 2017 | Blockchain, Identity
Internet identity management has struggled to replicate existing real (physical) world systems. For example, crossing a country border generally requires a physical passport, and buying alcohol (in the US at least) requires the presentation of a driver’s license. This...
Recent Comments