2019 Digital Identity Progress Report

2019 Digital Identity Progress Report

Schools out for summer? Well not quite. Unless you're living in the east coast of Australia, it's looking decidedly bleak weather wise for most of Europe and the American east coast. But I digress. Is it looking bleak for your digital identity driven projects? What's been a success, where are ... Read More
Renewable Security: Steps to Save The Cyber Security Planet

Renewable Security: Steps to Save The Cyber Security Planet

Actually, this has nothing to-do with being green. Although, that is a passion of mine. This is more to-do with a paradigm that is becoming more popular in security architectures: that of being able to re-spin particular services to a known “safe” state after breach, or even as a preventative ... Read More
12 Steps to Zero Trust Success

12 Steps to Zero Trust Success

A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term coined by analyst group Forrester back in 2010 and has gained popularity since Google started using the ... Read More
Cyber Security Skills in 2018

Cyber Security Skills in 2018

Last week I passed the EC-Council Certified Ethical Hacker exam. Yay to me. I am a professional penetration tester right? Negatory. I sat the exam more as an exercise to see if I “still had it”. A boxer returning to the ring. It is over 10 years since I passed ... Read More
The Role Of Mobile During Authentication

The Role Of Mobile During Authentication

Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app. Examples include Google’s Authenticator, Facebook’s options for MFA (including their Code Generator, built into their mobile app) or LinkedIn’s two-step ... Read More
How Information Security Can Drive Innovation

How Information Security Can Drive Innovation

Information Security and Innovation: often at two different ends of an executive team’s business strategy. The non-CIO ‘C’ level folks want to discuss revenue generation, efficiency and growth. Three areas often immeasurably enhanced by having a strong and clear innovation management framework. The CIO’s objectives are often focused on technical ... Read More