Resources & News
Report from Identiverse 2021
We were in person at Identiverse in 2021. Read our report to find out more about what was discussed at the conference.
Role-based Certificates and Group Certificates
What are Role Certificates and Group Certificates? How are they different from normal certificates? How are they different from each other?
Jargon Free Security, Part VI: Execution
“Execution” is the work you need to do so that your department can do the real work.
The Jargon Free Security Model, Part V: Innovation
To stay ahead of threats, you must constantly improve your businesses capabilities through innovation. Innovation requires experimentation, but most experiments fail. How do you manage innovation so that you minimize the failures and maximize the benefits?
The Jargon Free Security Model, Part IV: Compliance
Compliance is not security, but it must be done. The trick is to understand the cost of compliance vs. the business benefit of compliance and aim for the minimum standard.
The Jargon Free Security Model, Part III: Control
Control represents your ability to prevent, respond to, or recover from hacking attempts.
The Jargon Free Security Model, Part II: Visibility
Visibility is the foundational capability of information security, because you can’t protect what you are not aware of.
The Jargon Free Security Model – Introduction
To communicate security program objectives and achievements outside of the security department, avoid security jargon and speak plainly. Part 1 of a series.
A Certificate Management System (CMS) is now mandatory
Recent changes by the CA/B forum have made deployment of a Certificate Management System mandatory for enterprises. Find out why, and what to do about it in this article.
IDENTIFY2020 – Ping Identity Conference Report
Credentive Security reports on the announcements made at the Identify2020 Keynote Address from Ping Identity.
Learning Identity, Credential, and Access Management
The NIST FICAM Architecture is the best under-appreciated resource for learning about Identity and Access Management Concepts.