We think we’re talking about a thing when we refer to identity provisioning, or “Bring...
Update 19 May 2014: I changed “assertions” to “attributes” in the body of the blog,...
This blog post builds a little further on my ecological ideas about the state of...
An awkward fracas has broken out in the identity standards community over the process that...
In information security we’ve been saddled for years with the tacit assumption that deep down...
In Identity and Access Management, Levels of Assurance (LOAs) are an attempt to harmonise the...
With the term “ecosystem” being bandied about so much, I started thinking ecologically last year....
Imagine this. Two grain growers are neighbours. One farms wheat and the other corn. Both...
In modern information security we implore businesses to understand the risks of their particular business...
With apologies to Friedrich Nietzsche. The hero of many a crypto folk tale Bob is...