Remember Defense-in-Depth? Apply It To The Customer Lifecycle. Users, especially those in customer identity, have a lifecycle. They register, they login, they give and revoke consent, and they update passwords or MFA settings. They may arrive via federation and they may be federated to other systems. Ultimately, they may decide to disable or delete their accounts. It's important to look at each of these steps along the customer lifecycle and apply some manner of threat modeling to it.
The What and the Why of Any Modern CIAM Platform When choosing a CIAM offering, there are many must-have capabilities which should be provided by the platform. We discuss what they are, why they're important to any digital transformation initiative, and most importantly, their importance and significance to the customer.
What Do a Security Trade Show and a Poorly Designed Website Have in Common? RSA was the same hot mess that it always is. Every year I tell myself it will be my last visit, who knows when it will be true. I do know that I would be much less likely to search for reasons not to go if they implemented some of the basic principles of CIAM.