[Log In] []

Exploring the science and magic of Identity and Access Management
Thursday, July 28, 2016

Lost in Cyberspace

Humor, Identity
Author: Mark Dixon
Thursday, September 8, 2011
3:27 am

What did you lose, Ziggy?  Sometimes, I think I am losing my mind.

By the way, did you know that Dictionary.com defines “cyberspace” as “the realm of electronic communication?”  Such a mundane definition for such an intriguing subject!


The Growth of Social Media

Social Media
Author: Mark Dixon
Saturday, September 3, 2011
6:12 am

Did you know that Facebook has a population of over 600 million registered users – trailing only the nations of China and India? The following infographic from Search Engine Journal is a fascinating study of the growth of Social Media over the past few years.

The Growth of Social Media: An Infographic

Source: The Growth of Social Media: An Infographic


Veriphyr Study: Protected Health Information (PHI) Privacy Breaches

Identity, Information Security
Author: Mark Dixon
Friday, September 2, 2011
5:51 pm

This afternoon, I received word that Veriphyr, a provider of SaaS Identity and Access Intelligence services, announced the results of new survey on Protected Health Information (PHI) privacy breaches. According to the report,

More than 70 percent of the organizations in the study have suffered one or more breaches of PHI within the last 12 months. …

Insiders were responsible for the majority of breaches, with 35 percent snooping into medical records of fellow employees and 27 percent accessing records of friends and relatives.

Some interesting statistics:

Top breaches in the past 12 months by type:

  • Snooping into medical records of fellow employees (35%)
  • Snooping into records of friends and relatives (27%)
  • Loss /theft of physical records (25%)
  • Loss/theft of equipment holding PHI (20%)

When a breach occurred, it was detected in:

  • One to three days (30%)
  • One week (12%)
  • Two to four weeks (17%)

Once a breach was detected, it was resolved in:

  • One to three days (16%)
  • One week (18%)
  • Two to Four weeks (25%)

79% of respondents were “somewhat concerned” or “very concerned” that their existing controls do not enable timely detection of breaches of PHI

52% stated they did not have adequate tools for monitoring inappropriate access to PHI

The report’s conclusion was not surprising:

Respondents who indicated strong satisfaction with their monitoring tools also tended to report fewer breaches of PHI and faster resolution times. The reverse is also true: respondents who indicated dissatisfaction with their monitoring tools tended to report more breaches and longer resolution times.
The morals of this story?
  • Cautiously trust, but verify the internal folks.  They are the biggest breach threat.
  • Do you want to tackle and solve your privacy breach problems? Good tools really do help.



Oracle Webcast: Escape the Quagmire with the Oracle Identity Platform

Author: Mark Dixon
Friday, September 2, 2011
4:29 pm

In an Oracle webcast on September 20th, Scott Bonnell, Sr. Director of Product Management, Oracle, and Naresh Persaud, Director of Product Marketing, Oracle, will explore how the Oracle identity platform can mobilize stalled deployments, allowing customers to accelerate identity projects.

This complimentary Webcast will show how the Oracle identity platform can:

  1. Mobilize and complete your identity management project
  2. Coexist with or replace your existing identity management point solution
  3. Reduce security risk and improve regulatory compliance
You can register for the webcast here.

Oracle Webcast: Analyzing the Identity Platform Versus Point Solution Approach

Author: Mark Dixon
Friday, September 2, 2011
4:08 pm

A couple of weeks ago, I blogged about a new Aberdeen Research Brief, “Identity and Access Management – Platform vs. Point Solution.” On September 15th, you can attend a webcast where Derek Brink, Vice President and Research Fellow, Aberdeen Group and Naresh Persaud, Director of Product Marketing, Oracle, will analyze the results of the Aberdeen study and explore how a platform approach can reduce the administrative cost, improve security and reduce audit exposure.


The webcast will show how :

Achieving a successful Identity Management program means integrating tools for administration, governance, sign-on, web-access control and authentication. Choosing an integrated suite or “platform” of solutions from a single vendor can have many advantages over choosing “point solutions” from multiple vendors.

You can register for the event here.

Copyright © 2005-2013, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.