Blog
An Ounce of Prevention is Worth a Pound of Cure
I used to hear this a lot growing up. But being the kid that I was, I didn’t really understand it’s meaning until I became an adult. Ask yourself about issues that you’ve had specifically in IT. All of the incidents that you’ve reported had a root [...]
Risk: The Good, The Bad And The Ugly
The world is simply riddled with danger and mystery. On the one hand, it can be fun and exhilarating. Taking your first climb, starting a new job, or changing careers. All have fun and exciting levels of risk. On the other hand, it's also something completely negative. [...]
Natural Disasters and Global Outbreaks Pave The Way For Security Risks
Natural disasters and global outbreaks, every year we see more of them. But, this blog isn’t about climate change, science, health, or whether you believe in any of it. Nope, today we’re focusing on what happens afterwards. That moment where your benevolent side takes over from your [...]
Introducing New And Improved Cobalt
Technology is dynamic, chaotic, and at times something that evolves beyond its creator’s original vision. The challenge of staying relevant in a time where there’s a constant barrage of startups can be never ending. Finding the right technology at the right time is like finding the diamond [...]
I Don’t Know Who You Are, But I’m Going To Help You Anyway…
Being a Managed Service Provider is challenging. To be a viable business you need to provide excellent service, keep things running lean, attract talent, and stay on top of technology trends and they're not mutually exclusive. While there are quite a few MSP's out there, it's [...]
Facilitating Machinery-of-Government Changes
A recent federal election in my home country has reminded me of the disruption and work load on IT resources that can arise from organizational changes in governments and in complex enterprises. Inevitably a change in government leads to a reshuffle of the bureaucracy with new [...]
Passwords Must Die!
Identity is a core component of cybersecurity, and as such I tend to pay attention to security breaches and the various exploits that underlie them. The picture is not pretty. Just considering the top 20 breaches in 2018, we see that roughly 2.9 billion accounts were [...]
Hybrid Identity Conference: All Tech And No Marketing
A lot of you will remember (fondly I hope) the Directory Experts Conference (DEC) we ran when I was at NetPro. DEC was a technology education and networking event focused on Microsoft identity technologies like Active Directory, ADFS, MIIS/FIM/MIM, and AD RMS, and it developed an [...]
13 Things To Look For In A Cloud Identity Store
The first, and arguably most important component of your cloud identity system is the identity and attribute store. It forms the heart of any identity system, whether it be a cloud-based or on-premises application. So what should you look for in a cloud identity store? Here are 13 questions we think you should be asking: [...]