Home

Blogs

 

Infosec Pro - modern, agnostic commentary on information security & risk

 

The Identity Cookbook - technical recipes for identity and access management solutions

 

 

OAuth2 Device Flow (contributor), Internet Engineering Task Force, March 2017

 

The Identity of Things: Security & Privacy Concerns, June 2014

 

Identity Mining & Insider Threat Monitoring, ISACA Journal, Oct 2012

 

Papers

Conferences

The Identity Manifesto - What it is and why you need one - Bristech Conference, Nov 2016

Identity Platform Demonstration - ForgeRock Identity Summit, London, October 2016

What Coco Chanel Taught Us About Identity - 15 min speed talk at the Whitehall Media IDM Conference, London, Nov 2015

Media Archive

Will the new UK Data Protection Bill reduce Brexit uncertainty? - article - Information Age, August 2017

 

Why a Data Privacy Officer isn’t the solution for GDPR - article - IT Pro Portal, July 2017

 

Life-or-death decisions: How do we safeguard healthcare IoT? - article - IoT Agenda, July 2017

 

A closer look at IoT 2.0 security - comment - Tech Radar, May, 2017

 

Data breaches strip tens of millions off UK firms’ market value, study shows - comment - Computer Weekly, April, 2017

 

A truly strategic approach to security has never been more business critical - article - IT Pro Portal, April 2017

 

One Solution to Digital Retail Dilemmas - article - IoT Insights, April 2017

 

Data Privacy Day 2017 - comment - SC Magazine, January, 2017

 

The IoT revolution is nigh: Make sure you're on the winning side - IT Pro Portal, January, 2017

 

Executive Viewpoint 2017 Prediction - Virtual Strategy Magazine, January, 2017

 

Mirai IoT botnet blamed for 'smashing Liberia off the internet' - comment - The Register, November 2016

 

GDPR's global reach to require at least 75,000 DPOs worldwide - comment - SC Magazine, November 2016

 

Interview: Are online passwords dead? - IT Pro Portal, October 2016

 

Dyn DDoS attack highlights vulnerability of global internet infrastructure - comment - Computer Weekly, October 2016

 

Record Rambler Breach Highlights Password Flaws - comment - Infosecurity Magazine, September 2016

 

Do IoT devices need a kill switch? - interview - Rethink-IOT Magazine, August 2016

 

Will the IoT kill off passwords? - interview - IoT Magazine, August 2016

 

Osram smart lighting flaw lets hackers breach home Wi-Fi - comment - IT Pro Portal, August 2016

 

BMW web portal vulns pose car hack risk – researchers - comment - The Register, July 2016

 

Techxit Brexit – People, investment, regulation, data sovereignty & privacy - comment - Computer Business Review, July 2016

 

Mitsubishi Outlander hack: Industry reaction - IT Pro Portal, June 2016

 

Companies should NOT force customers to keep changing their passwords - GCHQ - comment - Information Age, May 2016

 

Is Identity Critical to Make Smart Cities Safe? - TechRadar Pro, April 2016

 

Interview with The Telegraph's Business Reporter on Digital Identity - Business Reporter, April 2016

 

Does IoT Security Still Have Further To Go? - IT Pro Portal, April 2016

 

Connected Car Security: why identity should be in the driving seat - Information Age, March 2016

 

Embracing the Digital Revolution - 5 Key Pillars of Transformation - BDaily, February 2016

 

5 tech reactions to the EU Data Protection Regulation - Computer Business Review, Dec 2015

 

Open Source: Security through transparency for IoT platforms - IoT Now Magazone, Dec 2015

 

Future smart things to be cooperative, emotional and lucrative - Wireless Magazine, Nov 2015

 

Securing the IoT is a big challenge... but how do we do it on a city scale? - Information Age, Oct 2015

 

Back to the Future: The reality of the film's technical predictions in 2015 -

Computer Business Review, Oct 2015

 

IoT Security Foundation aims to secure Internet of Things - SC Magazine, Sept 2015

 

Handling Privacy and Security Concerns in the IoT: The Importance of Identity -

EDN Network Magazine, July 2015

Events That Defined the European Infosec Landscape - Help Net Security Magazine, Jan 2013

 

Do You Need a CISO? - Computer Weekly, Oct 2012

 

User Convenience versus Security - Microsoft Technet Medium Business Blog, Oct 2012

 

 

 

 

 

 

 

 

Copyright 2007 - 2018 Simon Moffatt © All Rights Reserved. Headline image courtesy Whitehall Media.