public media
cybersecurity
Containing Third Party Identity Risk
Adversary-In-The-Middle (AiTM) Phishing Attacks
Rainbow Table Attacks
Gartner IAM Conference, 2022 - thoughts and observations
Zero TrustBest practices for implementation
decentralized intelligence
40+ articles on Decentralized Identity, User Privacy and Multi-Factor Authentication
leadership
Security Management Leadership
Are you a high ROM Manager?
strategy
50+ Quantitative analyses of innovation, strategy, finance, valuation, economics and Game Theory
Strategy in Wireless Technology and Standards - a case study
Strategy models-Five Forces and Game Theory, a narrative in comparison
Strategy for Security, a pure bargaining model
Mergers and Acquisitions- transactional primer
Google Mobile Strategy- a case study
game theory
Case for game theory for influencing customer behavior
Gamification orthodoxies: intrinsic and extrinsic rewards
assurance
The Identity Developer platform offered on a cloud-hosted Sandbox
orchestration
Identity Workflow using Authentication Trees and Google Cloud Functions with Zeebe Cloud
authorization
Identity Microservices with Consul on OpenShift
Environment Runtime management identity microservices with Hashicorp Consul
Token Exchange and Delegation using Identity Microservices
Securing your (micro)services with ForgeRock Identity Microservices
A framework for dynamic role based authorization
authentication
The first FIDO mobile app integration!
Behavioral biometrics authentication
Client and server side scripting for authentication
Extend the power of the ForgeRock Identity Platform through scripting
WS Federation support with simple modifications to a SAML Engine
2FA predictive authentication using Phone-based risk signals
Geo Fencing using reverse geo-location APIs
Deploying social login risk profiles using social networking risk signals
Knowledge Based Authentication
Impersonation techniques for Helpdesk management in modern access management products
Identity Provider proxy using Active Directory Federation Server