Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

Topic

Customer Identity

Identity for the people who pay you. Lower friction, higher trust, regulatory compliance baked in.

Customer Identity and Access Management (CIAM) is the set of identity capabilities that face external users — your customers, applicants, members, citizens. Unlike workforce IAM, CIAM is judged on conversion rate as much as on security. Every additional step in registration drops sign-ups; every false-positive in fraud detection costs a real customer. The market leaders (Okta CIC, Auth0, Microsoft Entra External ID, Ping, ForgeRock Identity Cloud) compete largely on developer experience and time-to-launch.

The hard problems are different from the workforce side: progressive profiling without surveillance creep, consent and preference management compliant with GDPR / CCPA / Quebec Law 25, integrated fraud and bot detection, account-takeover defense at scale, and orchestration of complex onboarding flows (KYC, AML, age verification) without rebuilding auth from scratch.

This page tracks our reporting on CIAM platforms, breach response in B2C contexts, and architectural patterns that scale to millions of identities without losing privacy.

Coverage

No posts yet under this topic.

We're writing. In the meantime, follow our breach feed or CVE dashboard for live intelligence.