cybersecurity

Containing Third Party Identity Risk
Adversary-In-The-Middle (AiTM) Phishing Attacks
Rainbow Table Attacks
Gartner IAM Conference, 2022 - thoughts and observations
Zero TrustBest practices for implementation

decentralized intelligence

40+ articles on Decentralized Identity, User Privacy and Multi-Factor Authentication

leadership

Security Management Leadership
Are you a high ROM Manager?

strategy

50+ Quantitative analyses of innovation, strategy, finance, valuation, economics and Game Theory
Strategy in Wireless Technology and Standards - a case study
Strategy models-Five Forces and Game Theory, a narrative in comparison
Strategy for Security, a pure bargaining model
Mergers and Acquisitions- transactional primer
Google Mobile Strategy- a case study

game theory

Case for game theory for influencing customer behavior
Gamification orthodoxies: intrinsic and extrinsic rewards

assurance

Synthetic identity and fraud

The Identity Developer platform offered on a cloud-hosted Sandbox

orchestration

Identity Workflow using Authentication Trees and Google Cloud Functions with Zeebe Cloud

authorization

Identity Microservices with Consul on OpenShift

Environment Runtime management identity microservices with Hashicorp Consul

Token Exchange and Delegation using Identity Microservices

Securing your (micro)services with ForgeRock Identity Microservices

A framework for dynamic role based authorization

authentication

The first FIDO mobile app integration!

Adaptive Authentication

Behavioral biometrics authentication

Client and server side scripting for authentication

Extend the power of the ForgeRock Identity Platform through scripting

WS Federation support with simple modifications to a SAML Engine

2FA predictive authentication using Phone-based risk signals

Geo Fencing using reverse geo-location APIs

Deploying social login risk profiles using social networking risk signals

Knowledge Based Authentication

Impersonation techniques for Helpdesk management in modern access management products

Identity Provider proxy using Active Directory Federation Server