Top

Get inspired by interesting questions you should ask yourself when planning or already running (federated) identity for Office 365 in a business continuity case or disaster recovery case. Have you thought about Password Hash Synchronization as a fallback, for a fast recovery?...

We have more and more inquiries about the automation of business interactions and processes with intelligent technologies. Today's tech landscape offers a wide range of services to implement such requirements, so I would like to highlight some introductory thoughts...

Which type of architect is the right one for your digital transformation? This article provides a deep-diving into three primary architect profiles and how they will address different requirements, needs, and types of insight that may span business to technology....

This article asks you to reset your thinking about your perimeter, the firewalls you built and the border between inside/outside: they no longer exist. Modern access patterns blur the lines between inside vs. outside and you need to manage your risk differently than building a wall and controlling what’s passing...