Does IAM have to be that hard?
The identity lifecycle gap between HR systems and Entra ID has existed for years. Legacy tools filled it, but at a cost. Here is why we decided to build something new from scratch, and how we are doing it.
The identity lifecycle gap between HR systems and Entra ID has existed for years. Legacy tools filled it, but at a cost. Here is why we decided to build something new from scratch, and how we are doing it.
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
Your Azure Tenant Is a Policy Landfill
Entra Agent ID In Practice: Picking The Right Pattern And Building Safe Defaults
3: The Future of Digital Identity: Verification and zero-trust security
Microsoft just shipped the missing primitive for tenant governance: UTCM in Graph (beta)
You want to let teams build and use agents without creating a parallel identity estate you cannot explain, audit, or shut down. You want autonomy with boundaries, and speed with accountability.
AI agents are moving from experiments to infrastructure. They read, decide, and act. Sometimes in response to a human. Sometimes on their own.
2: The Future of Digital Identity: The verified ID workflow and issuance
1: The Future of Digital Identity: How Verified ID Works
Most organizations today rely on external partners to run critical parts of their operation. Infrastructure is hosted. Applications are delivered as services. Security tooling is licensed rather than built. This is not a weakness. It is how modern organizations scale.
Bufdir – the Norwegian Directorate for Children, Youth and Family Affairs, is at the very core of Norway’s welfare state.
IAM 101: The Questions You Should Be Asking About Access (Even If No One Has Said Them Out Loud Yet)