Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

[ AUTHOR PHOTO ]

Paulo Valadares

IAM Engineering Manager · Security Architect · Builder

I lead Identity & Access Management engineering for one of Canada's largest corporations, where I architect and manage IAM infrastructure protecting millions of identities across hybrid cloud environments.

I started Identity at the Core because I believe the IAM community deserves a central, independent source for real-time intelligence — not vendor marketing, but the raw signal: breaches, vulnerabilities, policy shifts, and the hard lessons that come with managing identity at enterprise scale.

When I'm not building identity infrastructure, I'm building tools to help other IAM professionals work smarter. I also speak about identity security, Zero Trust architecture, and the evolving threat landscape at industry events.

10+
Years in IAM
M+
Identities Managed
Top 3
Canadian Corp
15+
Tools Built

Opinions & Analysis

Opinion

Why Most Zero Trust Implementations Fail at the Identity Layer

After reviewing dozens of enterprise Zero Trust deployments, the pattern is clear: organizations invest in network segmentation and endpoint security but treat identity as an afterthought.

April 15, 2026 · 8 min read · 342 views
Deep Dive

The Hidden Cost of Service Account Sprawl: A Real-World Case Study

I recently audited an environment with 12,000 service accounts — only 3,400 were still in active use. Here is the methodology I used and what we found.

April 10, 2026 · 12 min read · 891 views
Practical Guide

Building a Privilege Escalation Detection Pipeline with Azure AD Logs

A step-by-step guide to building a real-time alerting pipeline that catches suspicious privilege escalation patterns in Entra ID, using KQL queries and Logic Apps.

April 3, 2026 · 15 min read · 1,247 views
Industry Take

SCIM Is Broken — And We Keep Pretending It Works

The System for Cross-domain Identity Management was supposed to solve identity provisioning. Instead, every vendor implements it differently.

March 28, 2026 · 6 min read · 2,103 views
Lessons Learned

What I Learned Managing IAM for 2M+ Identities at Scale

Five years of lessons compressed into the things I wish someone had told me on day one: lifecycle management, governance automation, and the politics of access.

March 20, 2026 · 10 min read · 3,456 views

Ask Me Anything About IAM

Got a question about identity security, architecture, or career advice? Ask away — I answer every week.

Submit Your Question

Bot verification by Cloudflare. Your email won't be published.

Recent Answers

No published answers yet. Be the first to ask a question — I answer the best ones every week.

Looking for an IAM Speaker or Consultant?

Available for keynotes, workshops, advisory engagements, and podcast appearances

About | Identity at the Core