* Your thoughts on the wider use of identity management I’m very gratified by the response I got from last week’s cry, even desperate plea, for information that identity wasn’t somehow becoming merely the authentication step in a larger security process. Quite a few of you responded with notes on your personal projects as well as larger undertakings both from the user perspective and that of the identity management vendor community.Australia’s John Tregea of Debraneys Systems, a vendor to the maritime industries, even forwarded a “statement of requirement” he’d received from the Australian Customs Service (you can get it here), which outlines a fairly rich set of identity management requirements.Ian Glazer from Trusted Network Technologies, pointed out that he wrote about this whole “authentication obsession” problem a couple of months ago when he noted how easy it was to hack airport security. As he concludes, “Yes, authentication is important, but we cannot lose sight of the fact that authentication is just the beginning. Recognizing an identity is the start. Observing how that identity interacts with other identities fills in more of the picture. Getting the complete picture involves both recognition and observation.”The Higgins Project’s Paul Trevithick really warmed my cockles when he wrote: “In June at the Berkman Conference we’ll be demonstrating using a Personal Information Provider (a Higgins-based Web service called a PIP) to support a Firefox browser extension called HBX that will show how a person can ‘project’ (don’t know the right word) their anonymous preferences on to an e-commerce site, the conference sites, and others. This is NOT about single sign-on at all.” The Berkman Conference on User Centric Identity and Commerce will be held June 19-21 in Cambridge, Mass. Sorry, but I couldn’t find any Web link to more information but watch the Berkman site for details. Michael Richtberg of Citrix Systems perhaps summed it up best when he said: “I couldn’t agree with you more in your comments about identity management not solely being for security. In fact, I’d argue that security is what’s ‘maintained’ by these products, but that they are purchased to enhance usability.”It does seem there’s still hope, so I’ll pass up the hemlock for now. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe