Blog2023-05-25T03:05:57+10:00

Blog

Zero Trust Requires a Culture Shift – Not Just New Tech

By |

Zero Trust Requires a Culture Shift – Not Just New Tech “Never trust, always verify.” This mantra defines Zero Trust security, but achieving it takes more than deploying new tools. Many organizations invest in strong authentication, identity management, and network controls, only to find those technologies fall short without [...]

An Ounce of Prevention is Worth a Pound of Cure

By |

An Ounce of Prevention is Worth a Pound of Cure I used to hear this a lot growing up. But being the kid that I was, I didn’t really understand it’s meaning until I became an adult.  Ask yourself about issues that [...]

Risk: The Good, The Bad And The Ugly

By |

Risk: The Good, The Bad, And The Ugly The world is simply riddled with danger and mystery.  On the one hand, it can be fun and exhilarating. Taking your first climb, starting a new job, or changing careers.  All have fun [...]

  • Natural disasters pave the way for security risks

Natural Disasters and Global Outbreaks Bring Security Risks

By |

Natural Disasters and Global Outbreaks Bring Security Risks Natural disasters and global outbreaks, every year we see more of them.  But, this blog isn’t about climate change, science, health, or whether you believe in any of it.  Nope, today we’re focusing [...]

Facilitating Machinery-of-Government Changes

By |

Facilitating Machinery-of-Government Changes A recent federal election in my home country has reminded me of the disruption and work load on IT resources that can arise from organizational changes in governments and in complex enterprises. Inevitably a change in government leads [...]

Passwords Must Die!

By |

Passwords Must Die! Identity is a core component of cybersecurity, and as such I tend to pay attention to security breaches and the various exploits that underlie them. The picture is not pretty. Just considering the top 20 breaches in 2018, [...]

Hybrid Identity Conference: All Tech And No Marketing

By |

Hybrid Identity Conference: All Tech And No Marketing A lot of you will remember (fondly I hope) the Directory Experts Conference (DEC) we ran when I was at NetPro. DEC was a technology education and networking event focused on Microsoft identity [...]

13 Things To Look For In A Cloud Identity Store

By |

The first, and arguably most important component of your cloud identity system is the identity and attribute store. It forms the heart of any identity system, whether it be a cloud-based or on-premises application. So what should you look for in a cloud identity store? Here are 13 questions we think you should be asking: [...]

Go to Top