© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_3

3. An Identity Crisis

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

Is your organization undergoing an identity crisis (or identity security crisis for those who need clarification for the play on words)? Whether you believe it or not, it probably is. While you may not appreciate the simple wordplay to describe the actual problem, you made it to the third sentence of this chapter (only something a human can do), and you know that your identity crisis is not a personal one, but rather describes a problem with how you manage identities and identity ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.