The Science and Art of Designing the Login Journey

Goldilocks may well have ended up an expert in Intelligent Authentication because she was onto something about that bowl of porridge: not too hot, not too cold, but rather just right. The Goldilocks principle, when applied to customer experience, helps determine the acceptable amount, type and detail of friction in a user login journey.

In the latest video in our Intelligent Authentication series, we cover how access to that data helps provide that “just right” experience for your customers.

 

Read More »

What is OAuth2? A Real World Example.

 

What is OAuth2? It can seem quite complicated, but it doesn’t have to be. Before OAuth2, when you needed to give software services access to your account, you had to give that service your username and password. This meant there was no way to tell whether it was you or the agent accessing your data as a third party doing so on your behalf. That agent had access to everything in that account and you’d have to change the account password when you decided to cancel that service.

Read More »

Striving for a New High Water Mark in U.S. Data Privacy Policy: Part 2

In a continuation of my first post around privacy and the rising tide of global data regulation, I explore why “leaning in to consent” is the best way for U.S. companies to ensure smooth sailing with their customers amid the murky waters of data policy innovation.

Read More »

Humans, Bots, & Trust: Leveraging Threat Intelligence

Threat intelligence gives your security team the ability to balance trust and risk to achieve harmony between customer choice, usability, and data security. Check out how to get it done in the latest video in our Intelligent Authentication series:

 

Read More »

How Telcos Can Reinvent in a 5G World

Before jumping into the exciting identity provider opportunities now facing telecom companies, let's briefly discuss the concept of a "Digital Native." My guess is that by now, everyone is familiar with the concept: someone born and raised amongst the widespread use of digital technology. By contrast then, the rest of us (pre-dating 1985-ish) are ‘Digital Immigrants’, destined to struggle in this new digital world order.

Read More »

The IoT Opportunity: DBS Bank

In this Hot Topics episode, Chief Innovation Officer at DBS Bank, Neal Cross, discusses the IoT opportunity his company is pursuing: utilizing IoT products to improve relationships with their clients.

Read More »

Learn the Next Generation Skills for Digital Identity

Do you want to learn the skills required for the next generation of digital identity? If so, ForgeRock University has just refreshed its entire curriculum - starting with a series of core concepts classes that teach you all the new features of the ForgeRock Identity Platform. The curriculum then progresses to a new series of ‘deep dive’ classes; the first two will be on Agents and Advanced IDM connector configuration. The curriculum then progresses on to the advanced developer classes for ForgeRock Access Management and ForgeRock Identity Gateway.

Read More »

Striving for a New High Water Mark in U.S. Data Privacy Policy: Part 1

In this two-part series, I look at the deluge of personal data, the rising tide of global regulation and where the U.S. must drop its proverbial data policy anchor to build long-term customer trust.

Read More »

Device Context is Key to Productivity

People are constantly on the move; changing networks, devices, time zones, even several times per day. Mobility shouldn't keep us from being productive, right?

Read More »

User-Managed Access in Action

Historically, saving for retirement was fairly straightforward for the average worker: he or she would probably only work for a small number of employers during their careers and could usually keep track of their pensions without too much confusion.

Read More »

Upcoming Events:

AFCEA Fed Identity Forum

- Tampa, FL

The Federal Identity Forum & Exposition (FedID 18) is the U.S. federal government’s primary outreach and collaboration-building event with the worldwide identity community.

SecureCISO Charlotte

Charlotte, NC

By Invitation Only: 100 IT lnfoSec leaders collaborate in a day of thought-leading exchange as we examine directions from within the Office of the CISO; all under the umbrella of riveting keynotes, revealing panels, engaging round-tables and unparalleled networking.