CIS14: PingOne IDaaS: What You Need to Know
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Identity at Scale: Next Gen Federation Architectures
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Trusted Tokens: An Identity Game Changer
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room with LDAP, Context and Big Data
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS13: Identity—The Great Enabler of Next
CIS14: Protecting Your APIs from Threats and Hacks
CIS13: Mobile Identity: Divide and Conquer
CIS13: Fast IDentity Online (FIDO) Enables Better Authentication for the Open Mobile Ecosystem
CIS14: Handling Identity in AllJoyn 14.06
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: User-Managed Access
CIS 2014: Azure Active Directory (Sean Deuby)
CIS14: Knowing vs. Asking: Innovation in User Recognition
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Finding Balance