Joe Campbell

Contributor

Opinions expressed by ICN authors are their own.

Joe Campbell is Principal Security Advisor at One Identity. He is an accomplished software developer with an extremely diverse background that includes driving innovations for some of the world’s biggest companies, and pioneering new, award-winning technologies in wireless, RFID, visualization, communications and telephony. As a trusted security advisor, his experience in security and software architecture makes him a highly respected visionary and leader in the technology industry.

Before joining One Identity, Joe held the role of Principal Solutions Architect at Quest Software.

The opinions expressed in this blog are those of Joe Campbell and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Using social media for authentication: 3 pitfalls to avoid

Risks associated with third-party access

Risks associated with third-party access

Security processes to implement when dealing with third-party access to your company’s network.

Making the case for security spend

Making the case for security spend

How to gain management and customer support in security investments.

How IAM can help move the finish line for hackers

How IAM can help move the finish line for hackers

Identity and access management can be leveraged by an enterprise to secure a network that might already be compromised. Here's how...

Reduce cloud IT management headaches by approaching IAM the right way

Reduce cloud IT management headaches by approaching IAM the right way

Moving to the cloud has opened up new identity-related concerns and worries that we’ve never experienced before. The good news is businesses don’t have to fight the identity security battle on their own, and solutions, strategies and...

Who owns identity and access management?

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition.

Role-based access control is fine – who needs attribute-based access control?

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

Security myth: my admins would quit if I implement a password vault!

Security myth: my admins would quit if I implement a password vault!

The issue of secure password vaulting and the concern that something like that could never work at your company.

Security myths: modern federation is enough

Security myths: modern federation is enough

What exactly is federation and what does it have to do with single sign-on?

The security worries the season brings

The security worries the season brings

Why temporary workers cause security issues.

Security Myths: Users hate multifactor authentication

Security Myths: Users hate multifactor authentication

Just stop bludgeoning them with multifactor authentication (MFA).

Busting myths behind authentication and authorization

Busting myths behind authentication and authorization

We need to dispel some of the myths in cybersecurity, authentication and authorization. First up, are reverse proxies bad?

Load More