Sign up for
Posts by Topic
- Application cloud migration (4)
- Application Security (2)
- AWS (4)
- Azure Active Directory Best Practices (1)
- Best practices (3)
- Big Data (4)
- Big data insights (3)
- Cloud Computing Best Practices (11)
- Cloud Innovation (3)
- Cloud Migration (8)
- Cloud Shift (17)
- Cloud Shift Best Practices (6)
- Data intelligence (2)
- Design Patterns (1)
- Development teams (1)
- Enterprise Identity (10)
- For Developers (4)
- Google Cloud (2)
- Hadoop (2)
- IAM (16)
- Identity (5)
- Identity and Access Management (10)
- Identity and access management best practices (1)
- IdentityModel (1)
- IdentityServer3 (2)
- Indentity and Access Management Best Practices (4)
- Insider (2)
- Lift and Shift (4)
- Microsoft Azure (2)
- Programmer Productivity (1)
- QA & Testing (1)
- Technology mentorship (1)
- Technology Team Rental (8)
- Workstate (5)
- Workstate Codes (7)
- Workstate Stories (1)
- Sitecore (2)
- CMS (2)
Automate Everything! (Except Platform Upgrades)
AKA: Backwards Progression – Keeping Control of Your Solution Environment
Software development has always had its struggles. From dropping your perfectly ordered stack of punch cards to the nightmare known as "DLL Hell," developers are not strangers to environmental, platform and ecosystem pains.
In today's world, we have plenty of new...
Rest in Peace, IT Access Request Form
I am very sad to announce the death of one that many have held very dear to their heart – the IT Access Request Form. I never thought I’d be eulogizing such an integral part of my corporate life, but its day has come – and it’s time to move...
Spoiler Alert: Game of Thrones Guards Secrets with IAM Strategy
By Cyanide Studio - Cyanide Studio, CC BY-SA 3.0, Link
I have to admit — it makes me a little excited to see one of my favorite television shows collide with one of my favorite topics. It’s a rare event, so you can imagine how happy I was to see The Verge article...
Are You Asking the Right Questions of Your Identity Practice?
When people first start talking about the need for Identity and Access Management, it usually stems from some pain they're hearing from their users."Why can't I use my corporate login to access all of my systems?""Why do I have to keep logging in over and over to get...
Our Ancient Ancestors Had a Lock on IAM
We live in a world that’s inundated with security concerns, stemming from rapid advancements in modern technologies (IoT anyone?). Every now and then, we get to see some really cool historical tech (like Baghdad Batteries) that surpasses what we would generally expect from our ancient ancestors.
Not too long ago, The Verge put...
Windows Hello: Waving at the Future of Identity and Access Management
For most of computing history, the username and password have served as the defacto standard for user authentication. Yet, security experts have long-warned that passwords present a number of problems.
As cracking techniques have improved, longer and better passwords have been required. Good passwords are hard to remember and users will...