Remove tag identity-management
article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO Business Intelligence

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. In fact, for security, compliance, and efficiency reasons, CIOs will want to carefully manage which data generative AI has access to.

Hardware 143
article thumbnail

Defining Digital Identity

Phil Windley

Summary: The following is an excerpt from my upcoming book, Learning Digital Identity, which will be available January 2023. The family therapist Salvador Minuchin declared , "The human experience of identity has two elements: a sense of belonging and a sense of being separate." Tags: identity ldid.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Learning Digital Identity Podcasts

Phil Windley

Summary: If you enjoy listening more than reading, these two podcasts may be just the thing to get you up to speed on learning Digital Identity. I was recently the guest on a couple of podcasts to talk about my new book, Learning Digital Identity. Tags: ldid podcast identity ssi Just send me a note and we'll line it up.

CTO 52
article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. Photo Credit: Open Gate from aitoff (Pixabay License) Tags: zero+trust identity authorization authentication security

article thumbnail

Identity and Consistent User Experience

Phil Windley

Even so, Kim Cameron's Seven Laws of Identity speaks for consistent user experience in Law 7: Consistent Experience Across Contexts. Kim says: The unifying identity metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies. It's maddening.

article thumbnail

Web 2.0 is Collapsing Under its Own Weight

Phil Windley

And even with a password manager, the act of logging in is often a chore with different user interfaces, custom MFA requirements, and weird rules for passwords. But the real reason is that it's more convenient for them because these systems are integrated with their backends and make their processes more manageable. What's the answer?

Banking 50
article thumbnail

Toothbrush Identity

Phil Windley

Summary: Identity finds its way into everything—even toothbrushes. The toothbrush heads have a unique identity that the toothbrush recognizes. This identity is not only used to signal head replacement, but also to put the toothbrush into different modes based on the type of head installed.