Eric Norlin

Latest Posts

The evolving models of security...

The evolving models of security...

Phil and I have been speaking a lot recently about the changing of security models in the enterprise. The three basic models actually seem to represent a learning curve that both enterprises and the vendors are evolving through.

published October 17, 2006 by

Comments

Identity and social business applications

Identity and social business applications

John Milan has written an interesting piece about "social business applications" over on Read/Write web. He begins by defining "social business applications" as "software that coordinates group interaction that is important to running your business" -- a bit amorphous but workable definition.

published October 12, 2006 by

Comments

Digital ID World recap: final thoughts

Digital ID World recap: final thoughts

It's now almost a full month since Digital ID World is over and done, and my thoughts about what happened are finally starting to coalesce. "Starting" - I said, and this post (I hope) reflects that beginning.

published October 9, 2006 by

Comments

A big "small" problem

A big "small" problem

When looking at the larger picture of identity and identity management, it is easy to perceive certain things as relatively small issues and push them into the "we'll look at that later" category. But sometimes these issues aren't quite as small as they seem...

published October 6, 2006 by

Comments

Identity substitutes, tokens and proxies

Identity substitutes, tokens and proxies

When authentication is required, it is often easier (and creates a better user experience) to authenticate something other than the identity itself. This is so common, in fact, that it can take some thought to realize when an authentication verifies an identity and when it verifies something else entirely...

published August 31, 2006 by

Comments

John Cougar Mellencamp on NAC

John Cougar Mellencamp on NAC

Much is being made of a presentation at Black Hat by Ofir Arkin of Insightix. In that session, Arkin "raised questions" about the ability of Network Access Control technologies to do what they say they can do.

published August 2, 2006 by

Comments

Knock, knock -- who's there?

Knock, knock -- who's there?

Joris Evers has an article over on CNET about the "security risks" of Web 2.0. These days, whenever I read the words "security risks" I dig a little deeper to see if people actually mean "identity problem." As it turns out, most of the time they do.

published July 27, 2006 by

Comments

The identity silo paradox

The identity silo paradox

My recent post on Google's identity silo was part of a hailstorm (pun intended) of comments that occurred on the email list over at the Identity Gang. All of those fast-flying emails unveiled what I'm now calling the "identity silo paradox."

published July 26, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories