Blog
Closing the Identity Gap Between SSO and Zero Trust
Most organisations have made real progress with their identity management, and from a boardroom perspective it all looks healthy. However, speak to the teams responsible for running the identity infrastructure and you’ll hear a very different story.
Future-Proofing Access Control: XACML Next Generation
Perimeter-based security is obsolete. Distributed micro-services, ephemeral cloud infrastructure and third-party API integrations demand access-control decisions that are dynamic and context-aware. Static roles and permissions cannot match the velocity of modern delivery.
Zero Trust Requires a Culture Shift – Not Just New Tech
Zero Trust Requires a Culture Shift – Not Just New Tech The mantra "never trust, always verify" defines Zero Trust security, but achieving it takes more than deploying new tools. Many organizations invest in strong authentication, identity management, and network controls, only [...]
An Ounce of Prevention is Worth a Pound of Cure
An Ounce of Prevention is Worth a Pound of Cure I used to hear this a lot growing up. But being the kid that I was, I didn’t really understand it’s meaning until I became an adult. Ask yourself about issues that [...]
Risk: The Good, The Bad And The Ugly
Risk: The Good, The Bad, And The Ugly The world is simply riddled with danger and mystery. On the one hand, it can be fun and exhilarating. Taking your first climb, starting a new job, or changing careers. All have fun [...]
Natural Disasters and Global Outbreaks Bring Security Risks
Natural Disasters and Global Outbreaks Bring Security Risks Natural disasters and global outbreaks, every year we see more of them. But, this blog isn’t about climate change, science, health, or whether you believe in any of it. Nope, today we’re focusing [...]
I Don’t Know Who You Are, But I’m Going To Help You Anyway…
I Don’t Know Who You Are, But I’m Going To Help You Anyway... Being a Managed Service Provider is challenging. To be a viable business you need to provide excellent service, keep things running lean, attract talent, and stay on top [...]
Facilitating Machinery-of-Government Changes
Facilitating Machinery-of-Government Changes A recent federal election in my home country has reminded me of the disruption and work load on IT resources that can arise from organizational changes in governments and in complex enterprises. Inevitably a change in government leads [...]
Passwords Must Die!
Passwords Must Die! Identity is a core component of cybersecurity, and as such I tend to pay attention to security breaches and the various exploits that underlie them. The picture is not pretty. Just considering the top 20 breaches in 2018, [...]







