Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

Guest Columns

Field-tested perspectives from CISOs, architects, and IAM practitioners

Guest Column

Why Identity Teams Need Their Own Incident Response Playbook

When a credential is compromised, your generic IR playbook will fail you. Here is the identity-specific playbook we developed after a near-miss with a privileged session takeover.

Marcus Thompson· Director of IAM, Healthcare Systems Inc.· March 22, 2026· 11 min read· 2,876 views
Guest Column

The CISO's Guide to Justifying IAM Budget in 2026

Your CFO does not care about Conditional Access policies. Translate identity investments into the language of risk reduction, audit findings avoided, and operational toil eliminated.

Sarah Chen· CISO, North American Retailer· March 5, 2026· 7 min read· 1,890 views
Guest Column

Federated Identity in M&A: Due Diligence Checklist

A practical, day-zero checklist for assessing identity infrastructure during M&A — including hidden federation debt, orphaned trust relationships, and policy gap analysis.

David Rodriguez· Identity Architect, Big Four Consulting· February 18, 2026· 14 min read· 4,140 views
Guest Columns | Identity at the Core