Author: Paresh Borkar

Shift From The Cloud To The Edge

Overview Things always manage to come to a complete circle and technology is no exception to this. Initially, it started with mainframe machines on which one would time-share, followed by desktop revolution, then client-server and the shift to the cloud. Note in each of these transitions, we moved from centralized to de-centralized, and vice-versa. Until…

Data Provenance and Blockchain

Let us start with a quick understanding of each of these i.e. data provenance and blockchain. Data Provenance is the field of recording the history of data, from its inceptions to various stages of the data lifecycle. Thus, data provenance helps provide a detailed picture of how the data was collected, where it was stored…

NextGen IAM – Your Catalyst For Digital Transformation

New entrants in the market are taking a digital first strategy by embodying digital processes upfront. Quite a few of the new kids on the block have adopted a completely radical approach to solving an existing problem by going digital. This innovative approach has given these companies a significant edge. Uber, Ola are good examples....

Challenges With SAML Just In Time (JIT) Provisioning

If your organization uses cloud-based services, then it is quite likely that your IT team has already configured Single Sign On (SSO) for these cloud-based services. SSO ensures that you can use your enterprise account credentials for logging on to cloud-based services. SAML (Security Assertion Mark-up Language) is currently the gold standard for SSO. One...

Future of Authentication

Overview Most of us directly relate authentication with passwords. And this is rightfully so, since most of our interactions for authentication are based on a password. Passwords came into existence around 1961 at Massachusetts Institute of Technology [MIT] for use with the Compatible Time Sharing System (CTSS). CTSS allowed multiple users to work with the...

“Crowdsourced” DDoS attack using IOT devices

The recent massive distributed denial of service (DDoS) attack on 21st October 2016 affected numerous cloud service providers (Amazon, Twitter, GitHub, Netflix, etc.). It is interesting to note that this attack leveraged hundreds of thousands of internet connected consumer devices (aka IOT devices) which were infected with malware called Mirai. Who would have suspected that...

The Power of Context-Aware Authentication

Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...

Moving Beyond Passwords towards OTP

Passwords are a necessary evil, and are everywhere. Many organizations still rely completely on passwords for authentication purposes. While most of us are well aware of the limitations of passwords, we rarely move beyond them. How many of us use Two Factor Authentication (2FA) provided by cloud service providers like Google for all the services we...