Monthly Archives: May 2009
Thoughts on Oracle Identity Manager
I was reading through the architecture for Oracle’s Identity Manager “Best in Class” software. And while I never gave it much thought, you would have to be blind not to notice its popularity in the United States. The job offerings
Thoughts on Oracle Identity Manager
I was reading through the architecture for Oracle’s Identity Manager “Best in Class” software. And while I never gave it much thought, you would have to be blind not to notice its popularity in the United States. The job offerings
Steve Balmer on Efficiency & Decision Making
There is an interview with Steve Balmer in the International Herald Tribune and he makes a statement in response to a question about what’s it like to be in a meeting with him to wit; I’ve changed that, really, in
Steve Balmer on Efficiency & Decision Making
There is an interview with Steve Balmer in the International Herald Tribune and he makes a statement in response to a question about what’s it like to be in a meeting with him to wit; I’ve changed that, really, in
Part III of Security Architecture and Design
I have posted Part III the final part of my series on security archtitecture and design at Risk Intelligence. note: Fixed the broken link.
Part III of Security Architecture and Design
I have posted Part III the final part of my series on security archtitecture and design at Risk Intelligence. note: Fixed the broken link.
The other side of the article
It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed to be discussed. In an
The other side of the article
It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed to be discussed. In an
The Transition from CRG to GRC
I’m an Identity and Access Management kind of guy. I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an Identity Management
The Transition from CRG to GRC
I’m an Identity and Access Management kind of guy. I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an Identity Management
Unified Selection Model Whitepaper
The SGC Unified Selection Model whitepaper is available for download. The methodology is the culminination of research which began in May of 2000. There is an overview white paper and a shorter business brief. It’s a dynamic approach that responds
Unified Selection Model Whitepaper
The SGC Unified Selection Model whitepaper is available for download. The methodology is the culminination of research which began in May of 2000. There is an overview white paper and a shorter business brief. It’s a dynamic approach that responds
Part II of Security Architecture and Design
The second part of my series on security architecure and design is up a Risk Intelligence. In this post I look at the modular operators and give examples of how they have been used in security engineering.
Part II of Security Architecture and Design
The second part of my series on security architecure and design is up a Risk Intelligence. In this post I look at the modular operators and give examples of how they have been used in security engineering.