OAuth 2.0 Master Class - Part 1 - June 25 _ Identiverse 2019
Organizations are faced with an explosion of new, collaboration-focused SaaS apps and services, where it is increasingly becoming as easy to share resources with external partners as with employees.
(Part 1) The importance of Digital Identity and Access Management continues to grow in the field of cybersecurity. IAM still ensures “the right access to the right people at the right time for the right reasons,” but other issues like new regulations
Envisioned in 2011, BeyondCorp was a response to a state-sponsored attack of 2008 that targeted 20+ companies (including Google). BeyondCorp’s security model takes trust out of the corporate networks and instead uses identity.
The world of identity is terrifying. As an identity expert, you are expected to keep your arms around a constantly changing world of users, apps, and devices. And, you must do this while providing users secure and well-governed access from anywhere
In the Self-Sovereign Identity (SSI) community, there is broad support for Decentralized Identifiers (DIDs). The basic idea is that in order to build sovereignty, control, and privacy into an identity architecture, one has to start with identifierS.
Wouldn’t it be nice to live in a world where every identity project is a perfect fit for out-of-the-box features? It would be ideal to simply stay on the yellow brick road of prescribed solutions and guarantee success.