• DevOps Follow 1018 Followers

    GDPR for Operations

    by Jon Topper Follow 0 Followers on  Mar 10, 2018 1

    With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem.

  • Followers

    Author Q&A on Leading without Authority

    by Savita Pahuja Follow 3 Followers on  Aug 16, 2015 2

    Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. He refers to this as an "Individual Leader". This post explains how to lead without authority.

  • Followers

    Hologram - Finally, AWS Key Distribution that Makes Sense

    by Arian Adair Follow 0 Followers on  Mar 31, 2015

    Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram, a system that brings Amazon's Instance Profile mechanism to developer workstations. Adair details the process, tool design and main features.


Do we really need identity propagation in SOA and Clouds?

Posted by Michael Poulin Follow 0 Followers on  Aug 20, 2012

While a majority of security specialists are managing identity through SSO nobody has answered the question if identity propagation in SOA and Clouds is feasible from a business perspective. 6


Don't SCIM over your Data Model

Posted by Ganesh Prasad Follow 0 Followers on  Aug 08, 2012

This opinion piece discusses limitations in the SCIM data model specification as perceived by the author. He provides three specific suggestions which were also posted to the SCIM mailing list. 5


The Future of Authentication

Posted by Dirk Balfanz Follow 0 Followers , Jesus Molina Follow 0 Followers , Richard Chow Follow 0 Followers , Scott Matsumoto Follow 0 Followers , Ori Eisen Follow 0 Followers , Markus Jakobsson Follow 0 Followers , Steve Kirsch Follow 0 Followers , Paul van Oorschot Follow 0 Followers on  May 04, 2012

In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1


Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden Follow 0 Followers on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1