Infosec Pro - modern, agnostic commentary on information security & risk


The Identity Cookbook - technical recipes for identity and access management solutions



OAuth2 Device Flow (contributor), Internet Engineering Task Force, March 2017


The Identity of Things: Security & Privacy Concerns, June 2014


Identity Mining & Insider Threat Monitoring, ISACA Journal, Oct 2012




A Discussion Around Intelligent Authentication - London Identity Live Summit, Nov 2018

The Identity Manifesto - What it is and why you need one - Bristech Conference, Nov 2016

Identity Platform Demonstration - ForgeRock Identity Summit, London, October 2016

What Coco Chanel Taught Us About Identity - 15 min speed talk at the Whitehall Media IDM Conference, London, Nov 2015

Media Archive

Will the new UK Data Protection Bill reduce Brexit uncertainty? - article - Information Age, August 2017


Why a Data Privacy Officer isn’t the solution for GDPR - article - IT Pro Portal, July 2017


Life-or-death decisions: How do we safeguard healthcare IoT? - article - IoT Agenda, July 2017


A closer look at IoT 2.0 security - comment - Tech Radar, May, 2017


Data breaches strip tens of millions off UK firms’ market value, study shows - comment - Computer Weekly, April, 2017


A truly strategic approach to security has never been more business critical - article - IT Pro Portal, April 2017


One Solution to Digital Retail Dilemmas - article - IoT Insights, April 2017


Data Privacy Day 2017 - comment - SC Magazine, January, 2017


The IoT revolution is nigh: Make sure you're on the winning side - IT Pro Portal, January, 2017


Executive Viewpoint 2017 Prediction - Virtual Strategy Magazine, January, 2017


Mirai IoT botnet blamed for 'smashing Liberia off the internet' - comment - The Register, November 2016


GDPR's global reach to require at least 75,000 DPOs worldwide - comment - SC Magazine, November 2016


Interview: Are online passwords dead? - IT Pro Portal, October 2016


Dyn DDoS attack highlights vulnerability of global internet infrastructure - comment - Computer Weekly, October 2016


Record Rambler Breach Highlights Password Flaws - comment - Infosecurity Magazine, September 2016


Do IoT devices need a kill switch? - interview - Rethink-IOT Magazine, August 2016


Will the IoT kill off passwords? - interview - IoT Magazine, August 2016


Osram smart lighting flaw lets hackers breach home Wi-Fi - comment - IT Pro Portal, August 2016


BMW web portal vulns pose car hack risk – researchers - comment - The Register, July 2016


Techxit Brexit – People, investment, regulation, data sovereignty & privacy - comment - Computer Business Review, July 2016


Mitsubishi Outlander hack: Industry reaction - IT Pro Portal, June 2016


Companies should NOT force customers to keep changing their passwords - GCHQ - comment - Information Age, May 2016


Is Identity Critical to Make Smart Cities Safe? - TechRadar Pro, April 2016


Interview with The Telegraph's Business Reporter on Digital Identity - Business Reporter, April 2016


Does IoT Security Still Have Further To Go? - IT Pro Portal, April 2016


Connected Car Security: why identity should be in the driving seat - Information Age, March 2016


Embracing the Digital Revolution - 5 Key Pillars of Transformation - BDaily, February 2016


5 tech reactions to the EU Data Protection Regulation - Computer Business Review, Dec 2015


Open Source: Security through transparency for IoT platforms - IoT Now Magazone, Dec 2015


Future smart things to be cooperative, emotional and lucrative - Wireless Magazine, Nov 2015


Securing the IoT is a big challenge... but how do we do it on a city scale? - Information Age, Oct 2015


Back to the Future: The reality of the film's technical predictions in 2015 -

Computer Business Review, Oct 2015


IoT Security Foundation aims to secure Internet of Things - SC Magazine, Sept 2015


Handling Privacy and Security Concerns in the IoT: The Importance of Identity -

EDN Network Magazine, July 2015

Events That Defined the European Infosec Landscape - Help Net Security Magazine, Jan 2013


Do You Need a CISO? - Computer Weekly, Oct 2012


User Convenience versus Security - Microsoft Technet Medium Business Blog, Oct 2012









Copyright 2007 - 2018 Simon Moffatt © All Rights Reserved. Headline image courtesy Whitehall Media.