David LeeWE’RE MOVING!This publication will be shut down and moved to The Identity Jedi website. ( www.theidentityjedicom).Mar 20, 2023Mar 20, 2023
David LeeJedi Confession: The time I fired half the companyA long time ago in a galaxy far, far away…Oct 13, 2021Oct 13, 2021
David LeeThe Future of Cyber Security: Managing IdentityWhen people hear the words “cyber security,” they often think of antivirus software, firewalls, and other tools that protect against…Oct 6, 2021Oct 6, 2021
David LeeThe Lie that Tech is Built OnIn the tech industry, there is an arrogance that one solution is the only way to solve a problem, but in fact, there are many waysSep 29, 2021Sep 29, 2021
David LeeIdentity 3.0Over the next couple of posts, I will explore the future of identity and access management. Knowing what I know today and based on the…Sep 8, 2021Sep 8, 2021
David LeeSecuring your application: the new normalHow can we keep our applications secure in this day and age? There are no easy answers, but let’s take a look.Sep 3, 2021Sep 3, 2021
David LeeThe 3 laws of identity and access managementThree essential laws to follow when managing the authentication and authorization lifecycle for your applications.Sep 1, 2021Sep 1, 2021
David LeeWhy Identity Governance needs authorization controlsFind out why identity governance is not enough to prevent unauthorized accessAug 17, 2021Aug 17, 2021
David Lee3 Secrets of an IAM projectDISCLAIMER: This article may force you to have a hard look in the mirror and ask yourself some tough questions. You’ve been warned.Apr 3, 2019Apr 3, 2019
David LeeIdentity in a ZeroTrust WorldWe have a concept at SailPoint. Identity at the center of Security. Now it’s self-gratifying obviously, but when you dig a little deeper…Feb 28, 2019Feb 28, 2019