Office of the CTO

Welcome to the SailPoint Tech Blog

I’m excited to announce the launch of the SailPoint Tech Blog on Medium! The launch of our Medium blog brings us a fresh new coat of paint, but it is so much more than that. While blogging was something we were doing long before I joined the team, I realized […]

Why Remote Work is Not the New Normal

As we all struggle with Zoom fatigue, Slack overload, and months of not wearing pants (ok maybe not all of us), a very common discussion is whether this is the new normal. I’ve had this conversation with colleagues, friends, and family (ironically largely over Zoom). My perspective is that this shift to fully distributed […]

Mistaken Identity: Ransomware, Facial Recognition, and Liz Wharton

Lawyer, cybersecurity, and privacy maven Liz Wharton regales us with tales of her hand-to-hand combat experience with the Atlanta ransomware of 2018 and then unfolds the current state of facial recognition in all its manifold splendor (and we didn’t even get to cover the security of drones, yet another of […]

PSD2 and two-factor authentication: a double security challenge for banks

On September 14, 2019, the full mandate of PSD2 took effect, which means open banking will continue to make inroads into the financial fabric of society. While the full realization of this concept provides an opportunity for innovators, it also represents a unique privacy challenge. An Opportunity for Innovation Opening […]

The Identity Core

What’s the definition of a core? Years ago, there was this cheesy movie about the possible destruction of the planet. Side note: it was a weird time then. We were obsessed with making movies about the billion ways we would all die… anyway, I digress. But in this cheesy movie, […]

The Bernoulli Principle: Epidemiological Models for Identity

Smallpox is one of the deadliest diseases in all of human history. If you contracted Smallpox in the 18th century, you would have a one in three chance of dying within sixteen days. In the 20th century alone, Smallpox killed over 500 million people. Fortunately, it’s also the only infectious […]

Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Who was the real Tarra Simmons? On November 16, 2017, she sat before the Washington State Supreme Court. The child of addicts and an ex-addict and ex-felon herself, she had subsequently graduated near the top of her law school class. The Washington State Law Board had denied her access to […]

A Portent of Privacy

It was not the first such event, nor will it be the last. At 11:41 p.m. on January 20, 2019, the bright Austin night slipped into shadow as the full moon took on a deep crimson hue. The total lunar eclipse lasted only 62 minutes, but its effect on the […]

2018 Security-Minded Kids’ Holiday Gift Guide

By choosing wisely this season, you can not only get popular toys that your little ones will love, but you can also foster a security mindset in your children. The following toys are the top 2018 options that harness the power of play to ensure that the next generation is […]

The Business of Cybersecurity

I want to ask you a question, and I want you to take a minute to think about it before you answer really. Are you ready? There is a right answer, although it may not be what you think. IT security, cybersecurity, whatever we want to call it these days […]