Office of the CTO

PSD2 and two-factor authentication: a double security challenge for banks

On September 14, 2019, the full mandate of PSD2 took effect, which means open banking will continue to make inroads into the financial fabric of society. While the full realization of this concept provides an opportunity for innovators, it also represents a unique privacy challenge. An Opportunity for Innovation Opening […]

Trust in Numbers: An Ethical (and Practical) Standard for Identity-Driven Algorithms

Who was the real Tarra Simmons? On November 16, 2017, she sat before the Washington State Supreme Court. The child of addicts and an ex-addict and ex-felon herself, she had subsequently graduated near the top of her law school class. The Washington State Law Board had denied her access to […]

Das Bernoulli-Prinzip: Epidemiologische Modelle für Identity

Smallpox is one of the deadliest diseases in all of human history. If you contracted Smallpox in the 18th century, you would have a one in three chance of dying within sixteen days. In the 20th century alone, Smallpox killed over 500 million people. Fortunately, it’s also the only infectious […]

Der Kern der Identity

What’s the definition of a core? Years ago, there was this cheesy movie about the possible destruction of the planet. Side note: it was a weird time then. We were obsessed with making movies about the billion ways we would all die… anyway, I digress. But in this cheesy movie, […]

A Portent of Privacy

It was not the first such event, nor will it be the last. At 11:41 p.m. on January 20, 2019, the bright Austin night slipped into shadow as the full moon took on a deep crimson hue. The total lunar eclipse lasted only 62 minutes, but its effect on the […]

Leitfaden 2018 für Weihnachtsgeschenke für sicherheitsbewusste Kinder

By choosing wisely this season, you can not only get popular toys that your little ones will love, but you can also foster a security mindset in your children. The following toys are the top 2018 options that harness the power of play to ensure that the next generation is […]

Das Geschäft mit der Cybersicherheit

I want to ask you a question, and I want you to take a minute to think about it before you answer really. Are you ready? There is a right answer, although it may not be what you think. IT security, cybersecurity, whatever we want to call it these days […]

Mistaken Identity: Zero Trust, Full Identity, Can’t Lose

With apologies to Friday Night Lights, David Lee and Mike Kiser welcome back Darran Rolls, CTO and CISO of SailPoint, to discuss the central role that identity plays in implementing zero trust security models: to fully embrace zero trust, a comprehensive concept of identity is essential. Headlines include the well-orchestrated […]

Do the Right People Have the Right Access to the Right Data, at All Times?

At face value, it’s a simple question. But it’s one that most organizations struggle to answer.  This question is a restatement of what identity is.  Yet after twenty years of various identity management platforms and approaches, many organizations do not have a satisfactory answer to this question. Right People To […]

Cybersecurity: The Unwinnable War?

All too often security professionals find themselves in a situation where others in the enterprise question what business value cybersecurity ultimately brings to their organization. We’ve never been hacked, they think. We’re certainly not an interesting target for criminals or nation states so why are we spending so much of […]