Author Archives: Susan Morrow

IDG Contributor Network: Identity and the smart city

Human beings love cities, well many of us do. We love them so much that the United Nations are predicting that by 2050, 66 percent of us will live in them. So how do to make sure that all of those people are housed, have clean water, can get into and out of the city easily, and can breathe the air without coughing? Well, we make those cities, smart.

The market for smart cities is expected to be around $1.2 trillion by 2022. What this translates to, is a rush of companies going to go after that money by building smart products that enable the smart city. Smart cities are creating a veritable gold rush and this time the rush is built upon data – often our personal data. But to share and transact using that data we also need to build smart identity at the same time we build our smart city

To read this article in full, please click here

IDG Contributor Network: Privacy and metrics of testing and staging environments

One of the most vital aspects of building any system is the testing stage. With wide demographic, complex Customer Identity Access Management (CIAM) systems, this is arguably even more crucial. Testing is the development equivalent of proofreading. Developers make mistakes, they are, after all, human beings, and we all make mistakes – that’s why testing has taken on an almost religious air in some environments. Many years ago, I used to do security software testing, and there always seemed to be an uneasy tension between testers and developers. My defect reports created a raft of arguments, disbelief, followed by slow acceptance. Things have thankfully changed, well, at least they are changing. Testing, code quality, and staging environments are much more part of a holistic process and this is partly down to DevOps which has blurred the lines between the developers and QA.

To read this article in full, please click here

IDG Contributor Network: Microservices for IAM: container security and personal data

Identity and access management has become a bit of a beast. It has gone from a system that was contained within an enterprise – usually directory driven, for very controlled purposes – to something that impinges upon almost every aspect of our daily lives.

This has been driven by a number of factors: cloud computing changing the way we access files and documents, BYOD and shadow computing, and even the increase in remote working, has had an impact on the development of what IAM needs to be. IAM is shifting its morphology, it may still be expressed ultimately as a platform, but it will be based on an API framework.

To read this article in full, please click here

IDG Contributor Network: Credential recovery: disaster recovery for the consumer

In a series of posts, I’ll talk about the experiences I’ve had in designing identity access management for mass adoption. Unlike more old-school enterprise IAM systems, the consumer or customer IAM platform (CIAM) has some special needs that need addressing. In this first post, I’ll look at credential recovery challenges of CIAM.

Credential recovery for me, myself and I

When you set out to create an identity system that has to cope with millions of users, across a wide demographic, you have to think very carefully about how to manage the credentials of those users. After all, the system is generally the guardian of the user’s identity, so you have to think about a very big picture involving:

To read this article in full, please click here

IDG Contributor Network: Image management in identity management: a picture paints a thousand words

As we are all aware, we are living in the era of the “selfie.” Like them or loath them, they are filling the cloud like billions of droplets of water. In 2016, Google had 24 billion selfies uploaded to Google Photos. But it isn’t just selfies winging their way into the clouds. Social media in general is having a long, drawn out, love affair with images, Facebook having 350 million images uploaded every day.

There is a real, human-based, reason for this. A photo is a way to share who we are, what we do, and how we do it. And in the world of identity, images of ourselves, are, and will continue to be, a way to associate the real-me with the digital-me; even being used as proof of identity and authentication.

To read this article in full, please click here

IDG Contributor Network: Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen?

If you’re of a certain age, you will remember the dot-com revolution back in the day. I remember sitting in a meeting with the CEO of the company I was working with at the time. He sat across the table with about five of us and stated: “I want a dot com spin on our company – how do we do it.” Everyone wanted in on the dot-com act. It was seen as a major money maker, it didn’t matter if you had an angle or not, you had to do it to demonstrate true innovation in your organization.

Dot-com fell hard, like revolutions and empires before had fallen. But out of its ashes emerged a brave new Internet-based world.

To read this article in full, please click here