In my last blog post, we looked at some of the hazards in identity and access management (IAM) projects. Specifically, most IAM project initiatives are created from a very dangerous place -- the ...