Mobile Search Mobile Menu

By Christina Czeschik

IAM 911: How Strong Healthcare IAM Can Save Lives

Badly implemented IAM can kill you. Literally. The above statement is not just a scare tactic – it is a fact that has been proven in healthcare, sadly, many times over. The central function of IAM is to grant reliable access – for example to patient data – to those who are authorized, and to […]

By Christina Czeschik

Should we blockchain IAM?

From Buddhism to timeshares, from drones to cannabis farming: Blockchain is disrupting everything these days.  It seems…almost excessive? But IAM is different. Here, it makes perfect sense to employ a blockchain. How? Let’s take a look. Keeping users honest The central promise of the blockchain is simple. Within a community of people who don’t necessarily trust each […]

By Christina Czeschik

Hum@n Leader: QVC’s Angie Giardina

Welcome to our new series,  “Hum@n Leader”, where we introduce you to some of the most outstanding thought leaders in the IAM field. Our first profile is QVC’s IT Manager– Identity and Access Management, Angie Giardina. Angie’s gathered a very diverse range of experiences across many technologies, roles and industries. And yet despite of this wide range […]

By Christina Czeschik

Spy vs. Spy: Homegrown intelligence and counter-intelligence

“Behind closed doors” has always been an irresistible place. All kinds of people – from friendly neighbors to international spies – desperately want to know about the things people try to keep private from the world.  Especially what *businesses* like to keep private from the world.  Corporate espionage (or “aggressive competitive research”?)  is just part of doing […]

By Christina Czeschik

‘Tis the season (for identity theft)

A friendly holiday reminder: Time to ho – ho – hold tight to your identity. Hackers know that many of us are in online shopping-frenzy mode, submitting our payment card information over and over, sometimes several times a week. And they are poised to take advantage of this increased activity.   Consumers are at risk of losing more […]

By Christina Czeschik

Diversity in IAM: It takes all kinds

In almost every cliché, there’s a grain of truth. Let’s take, for example, the cliché of the cybersecurity professional: A 20- or 30-something male wearing a hoodie and a T-shirt bearing an obscure programming joke. One whose social interaction is mostly limited to eye-rolling behind users’ backs whenever they have committed yet another security blunder. Of […]

By Christina Czeschik

Winning The Talent War: Finding IAM Pros

Let’s face it: the phrase “Identity Administration and Government” does not send sexy shivers down the spine of the new university graduate. It doesn’t initially sound like the fast-lane to money, power and a corner office. In fact, to the aspiring white-hat hacker, it evokes the dreaded notion of working nine-to-five, in a fluorescent office, […]

By Christina Czeschik

Almost Perfect? Multi-factor authentication with biometrics

Two-factor and multi-factor authentication – the latest trend in identity and access management (IAM). The answer to all our cybersecurity prayers. The newest, hottest trend. Or is it? Actually, some would say it’s been around for centuries. After all, what methods have humans been using to recognize each other since the dawn of time? Not […]