Quantcast
Channel: Risk Horizon Blog » information security
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Whitepaper Download

For those of you looking to download a copy of Strategies for Creating an Authoritative Store, it is now available from the SECUDE Global Consulting website.  The paper was initially released through...

View Article



Image may be NSFW.
Clik here to view.

Identity Management 2.0

I saw an interesting article that discusses the concept of Identity Management 2.0. The article starts with a good recap of current, or Identity Management 1.0 capabilities, that we are all familiar...

View Article

Image may be NSFW.
Clik here to view.

When Enterprise Systems Collide…

It’s no secret that there are many systems in the Enterprise and that sometimes they seemingly come into conflict.  How many places are there where one can: Change information about themselves Change...

View Article

Image may be NSFW.
Clik here to view.

Project Scope and Sustainability

One thing I’ve noticed when talking to people about Identity Management projects involves how to determine the project’s overall scope.  “How do I scope this?” they will say to me.  Now that’s kind of...

View Article

Image may be NSFW.
Clik here to view.

System Shock

The negative sell is always the hardest to make, ”Do this to prevent this horrible outcome”. You rarely know if you were successful or not. The great leader stands on the rubble of the collapse with...

View Article


Image may be NSFW.
Clik here to view.

A Need for Standards

I came across an interesting eWeek Blog entry.  In it, Michael Vizard makes some interesting points about lack of standards in Identity Management. He makes some valid points in that there is no real...

View Article

Image may be NSFW.
Clik here to view.

Identity Theft and Enterprise Identity Management

When I tell people that I work in the Identity Management field, the first comment is usually something like, “Wow, identity theft, cool stuff.  What should I be doing to protect myself?” Sometimes...

View Article

Image may be NSFW.
Clik here to view.

Part II of Security Architecture and Design

The second part of my series on security architecure and design is up a Risk Intelligence.  In this post I look at the modular operators and give examples of how they have been used in security...

View Article


Image may be NSFW.
Clik here to view.

The Transition from CRG to GRC

I’m an Identity and Access Management kind of guy.  I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an...

View Article


Image may be NSFW.
Clik here to view.

The other side of the article

It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images