Three ways the Digital Identity Legislation can improve the identity status quo

When I recently applied for a new credit card, the issuing bank sent me a letter to verify my identity first. The options were to either visit one of their branches to show my ID, mail in a copy of my ID, or provide a recent utility statement. Not wanting to take time out of my day to visit a…

Read More

Key Considerations for Organizational Privacy 

As summer turns to fall, our world is settling into the rhythms of life under COVID-19, preparing for another season of sweatpants, existential dread, and peanut butter cups for lunch. The drumbeat of COVID life also involves skyrocketing rates of digital interaction, with all the privacy implications that go along with it. As an enterprise information security professional, you can’t…

Read More

Do You Really Need A Blockchain?

Blockchain is (still!) all the rage at identity and cybersecurity conferences. Blockchain sounds new and exciting, looks slick on marketing materials, screams “innovation!,” powers cryptocurrencies like Bitcoin, and has been billed as a cure-all for a variety of use cases. The US Federal Government faces so many technical challenges that it’s no wonder there’s interest in a magical cure! I…

Read More

Ten Things We Love About the NIST Privacy Framework

As cybersecurity and identity professionals, you might think we nerd out all day long talking about authentication, identity proofing, and federation – and you’d be mostly right. We are passionate about cybersecurity and identity but, for the record, we’ve been longtime privacy superfans. Frankly, we think good privacy enables good identity, not the other way around. Given NIST’s recent release…

Read More

Ten Things We Love About the Updated Federal Identity Guidance 

On May 21, 2019, OMB issued a new cybersecurity memorandum, M-19-17 – Enabling Mission Delivery through Improved Identity, Credential, and Access Management, setting forth a modernized policy for the federal government’s approach to Identity, Credential, and Access Management (ICAM). This long-awaited memo represents a major overhaul of federal identity policy and strategically points agencies to the risk-based approach detailed in…

Read More

Supporting Multiple Environments in a single TeamCity Build Config

Having multiple build configs can clutter up the TeamCity dashboard and make maintenance bothersome. The use of inheritance and build templates can help with maintenance, but that doesn’t solve the issue of having a build config for each environment (DEV, TEST, PROD, etc). Using TeamCity service messages and the TeamCity REST API can help solve this problem and keep all…

Read More

Reducing Costs in the Cloud using Machine Learning

In the modern-day business environment where organizations are consistently being asked to do more with less, businesses of all sizes are continuing to move to the cloud en masse. The switch to a cloud-based platform over a traditional on-premise installation is driven largely by a desire to reduce costs, with added benefits such as optimized performance and higher levels of…

Read More

Infrastructure As Code: The ODIN Way

This blog details how I accelerated the deployment of cloud environments through the creation of a web portal called ODIN ‘Optimal Deployment In Network’. This will be a continuation series with this article being Part I. Discussing The Problem With CI/CD most of the time being implemented by grabbing code, running tests, and deploying the code in question to a specific…

Read More

Restricting guest access to a Microsoft Teams tab linked to a SharePoint document library

Guest access is a new feature in Microsoft Teams that allows different organizations to collaborate together in a shared environment. Anyone with a business or consumer email account, such as Outlook, Gmail, or others, can participate as a guest in Teams with full access to team chats, meetings, and files. With the Teams and SharePoint site integration of an Office 365…

Read More