Identity and Access Management

Identity and Access Management (IAM) relates to the use of Identity credentials to access restricted resources. The most common example is a username and password combination that allows users access to certain applications or websites. While historically people have focused on alphanumeric passwords to protect accounts, new solutions are emerging to provide extra security while also seeking to reduce the friction associated with managing multiple identity and access credentials for the myriad of sites many of us access on a regular basis.

For corporates and governments alike, the ability to allow reuse of credentials for single sign on by users across multiple resources is also a boon for productivity and simplifies support and resulting costs.

The following resources serve to signpost the latest developments in the wider IAM sector, with a particular focus on personal solutions geared towards individuals.

Key Recommendations

All Articles

Bring your own identity gains steam in information security

Bring-your-own-identity (BYOI, or sometimes BYOID) is an emerging concept in Identity and Access Management. BYOI has become interesting because it presents a realistic solution to a pressing problem: the need for better federated identity management.

Protecting identity could be key to enterprise security

When you hear from people who know about security, the discussion often turns to end users, who are considered the weakest link in the security chain. While IT and the powers that be struggle to secure their networks and IP, the employees are forever screwing up succumbing to phishing scams, using weak credentials and generally causing problems for the security experts who know best — or so says conventional wisdom.

Identity is broken, is there money to be made in fixing it?

We all know that passwords are beyond their sell-by date – the IT industry has been telling us for years; and it seems that recently every week there has been a press release telling us about yet another new method of authenticating yourself to this banking service, or your mobile phone.

The business of our digital identity

The idea that we all have a digital identity that is unique and personal is still a relatively new idea. A digital identify is not a “brand new” identity that has been created as we trawl through the web looking at pictures of cats or messaging each other through Facebook.

The moments ahead for identity

My address to the European Identity Conference 2016. Although this starts like my TCP/IP Moment talk it goes in a very different direction. In some regards, I think this might be the most important talk I have ever written and delivered

A framework for identity

Last summer, IDEO coLAB brought together 25 students from top Boston-area universities — including Harvard, MIT, Tufts, and RISD — to design venture prototypes exploring the future of trust, transactions, and reputation. Before the program, I hadn’t given much thought to the concept of “identity” or identity systems. But abstract concepts start to take shape and become more tangible when you run into them repeatedly.

Know of a resource that helps people secure their data? Submit it today