Jim Routh

Chief Security Officer


Unconventional Controls in a Shifting Threat Landscape

Posted on: 07 Aug 2018

In the information security space, conventional wisdom says there is a simple formula for putting controls in place to protect systems, applications, and the data that courses through them. According to the formula, you should select a risk framework and a set of authoritative sources, like NIST 800-53, ISO 27001, or the Common Security Framework…

Model-Driven Security is the Future of Identity and Access Management

Posted on: 15 Jan 2018

The most common identity and access management (IAM) authentication control in use today is a user ID and password, and there is growing awareness that passwords are incrementally becoming obsolete as an authentication control. Three billion credentials were harvested in North America in 2016 alone according to Shape Security. You and I know there’s only…