In today’s interconnected digital landscape, identity has become the cornerstone of both organizational security and user experience. Whether onboarding a new employee or granting a customer access to services, the journey of identity—commonly referred to as the identity supply chain—encompasses a series of critical stages, from initial verification to continuous authentication and authorization.
Ken Buckler
Recent Posts
Identity Supply Chain – A New Approach to Identity Management and Security
By Ken Buckler on Jan 6, 2025 8:27:01 AM
Taking Flight: Aviator Soars One Year in at OpenText World 2024
By Ken Buckler on Dec 6, 2024 9:12:29 AM
OpenText World 2024 highlighted the growing role of AI in enterprise transformation, with Aviator, OpenText’s AI platform, as a focal point. Now one year into its deployment, Aviator has demonstrated significant potential in addressing challenges across industries by integrating AI into business processes. The platform reflects OpenText’s broader strategy of “Elevating Human Potential,” focusing on AI, cloud, and security as key drivers of innovation. Aviator’s emphasis on secure, data-driven AI models has positioned it as a useful tool for tackling the complexity of modern information management.
Bio-whatrics? In the Identity Market, Biometrics Solutions are Gaining Traction, but With Too Narrow a Focus
By Ken Buckler on Sep 17, 2024 9:46:36 AM
I recently had the opportunity to attend Identity Week in Washington, D.C. While this is a smaller conference compared to RSA Conference or Black Hat, some of the conversations were just as powerful and much more focused on the identity market. I was at first encouraged by the large focus of biometrics at the conference, but quickly discouraged upon seeing the limited use cases many of the vendors were promoting.
RSA Conference 2024 Tales from the Show Floor: How Security Needs to Focus on User Experience
By Ken Buckler on May 21, 2024 8:54:09 AM
According to the RSA Conference website, there was a total of 641 vendors exhibiting or sponsoring the conference in the over 738,000 square feet of exhibit space dedicated within the two-million-square-foot Moscone Center. I had meetings scheduled with approximately 20 of these vendors and met with a small handful of additional vendors on the expo floor as time permitted. I didn’t keep track of how far I walked this year, but the entire Moscone Center complex is approximately 87 acres in size. For comparison, the United States Capitol building is only 4 acres. I made several laps around the expo floor each day, as well as walking around the entire complex throughout various parts of the day. Needless to say, my feet are quite tired, but with the conversations I had with vendors, it was worth it.
Using Google Gemini to Analyze Trends in the RSA Conference 2024
By Ken Buckler on May 3, 2024 8:01:10 AM
The RSA Conference 2024 is upon us, and this year promises to be a treasure trove of insights for security professionals. We're particularly excited to explore the latest advancements in areas like AI-powered security and cloud protection. To enhance our analysis, we're putting Google Gemini, a large language model, to the test. Can it navigate the vast amount of information available about the conference and identify the themes that matter most? In this blog, we’ll explore the conference through the lens of Google Gemini, offering previews of sponsor briefings, session topics, and emerging trends that will shape the future of cybersecurity, and we’ll also examine Gemini’s ability to analyze text data.
Passwords: An Outdated Security Measure in Modern Times
By Ken Buckler on Mar 22, 2024 10:33:03 AM
In an era rampant with cyber threats, the security of passwords and identity remains a critical concern. According to HaveIBeenPwned.com, over 12 billion credentials were compromised online as of March 6, 2024. This staggering figure underscores the vulnerability of password-based authentication systems. Most (if not all) of these involve compromised passwords, and often expose not only a compromise to the originally affected domain or web application, but also multiple accounts utilizing the same email address and password.
Dynatrace Perform 2024: Making Waves While Navigating the Future of Cloud Innovation
By Ken Buckler on Mar 15, 2024 3:19:56 PM
The Dynatrace Perform 2024 conference delivered a plethora of insights and forward-looking perspectives this month. Throughout the conference, the event encompassed keynotes, breakout sessions, customer panels, and hands-on training, offering a holistic view of the latest trends and innovations in the tech industry. The overarching theme, "Make Waves," encapsulates the imperative for transformation and disruption in the tech industry. It underscores the need to drive substantial change and progress amidst evolving trends.
Black Hat Europe 2023: Navigating the Evolving Landscape of Cybersecurity
By Ken Buckler on Dec 22, 2023 3:47:45 PM
The Black Hat Europe 2023 conference, a gathering of cybersecurity professionals and experts, delved into the intricate world of cybersecurity, exploring emerging threats, innovative defense strategies, and the pressing need for collaboration between the private sector and government entities. Here's a breakdown of the key takeaways and highlights from a few of the conference sessions.
Tech at the Gap Decoded: A Look at Maryland’s “Best-Kept Secret” Technology Conference
By Ken Buckler on Oct 23, 2023 1:38:19 PM
Every year, technology enthusiasts and industry leaders gather at the serene Rocky Gap in Western Maryland for Tech at the Gap, an event that has earned the reputation of being one of the hidden gems of Maryland's tech conference scene. This year, the conference's theme, "Decoding Intelligence," promised to unveil the mysteries behind artificial intelligence and its transformative potential. With an impressive lineup of keynote speakers and breakout presenters, the event did not disappoint.
Playing to Win: Generative AI, Cloud Security, and More at Black Hat 2023
By Ken Buckler on Aug 18, 2023 11:48:34 AM
The stage was set, the players were ready, and Black Hat USA 2023 delivered a cybersecurity spectacle that left no doubt—this was a game-changing event. As we unpack the highlights, one overarching theme emerges: a united front against ever-evolving threats. From generative AI to cloud security and a glimpse into the future of defense, this year's conference illuminated the power of collaboration and innovation. Amidst these pivotal discussions, one revelation—the TETRA:BURST vulnerabilities—took center stage, leaving an indelible mark on the field.