Archives

  1. If Identity is the New Perimeter, Then We Need a Compliance Standard

    In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…

  2. Going Beyond Identity: Why Identity Security is No Longer Just an IAM Problem

    In today’s digital landscape, identity security has significantly evolved, expanding beyond the traditional capabilities of identity and access management and aligning more with cybersecurity strategies. Threat actors have also developed and capitalized on this evolution, leveraging identity and privilege as the most common means to breach an organization and cause disruption. They exploit every identity—human…

  3. Top Cybersecurity Trends & Predictions: A Look Into 2025 & Beyond

  4. Ask the Cybersecurity Experts: Why the Success of Modern Cyber Defense Hinges on Identity Security

    This article was original published by BeyondTrust. You can view the article here. An interview with cybersecurity experts from BeyondTrust: Janine Seebeck, Chief Executive Officer; Morey J. Haber, Chief Security Advisor; James Maude, Director of Research; Brad Call, Information Security Engineer; and Angela Duggan, Vice President of User Experience. Today is Identity Management Day (IMD), a day for raising…

  5. Why Identity Security Should Be the Basis of Modern Cybersecurity

    This article was originally published by BeyondTrust. You can view the article here. An Interview with the Authors of the latest book in the Attack Vector series, Morey J. Haber, Chief Security Advisor, BeyondTrust, and Darran Rolls, Identity, Security, Privacy & Compliance Advocate. It is easier for a threat actor to log in versus hack…

  6. Workforce Identity Security Best Practices: The Essential Role of Unified Identity Protection

    This article was originally published by BeyondTrust. You can view the article here. In any corporate environment, every worker needs access to multiple systems from day one (Active Directory, Okta, HR applications, Salesforce, finance tools—the list goes on and on). Those already numerous accounts—and privileges—then accumulate over time (privilege creep) as that employee changes roles…

  7. NIST Cybersecurity Framework 2.0 – What’s New & What You Need to Know

    This article was originally published by BeyondTrust. You can view the article here. Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The NIST Cybersecurity Framework 2.0 has emerged not just as an update, but also as a transformative approach to securing digital assets and…

  8. Top Cybersecurity Trend Predictions for 2024: BeyondTrust Edition

  9. Zero Trust Initiatives For Identity-First Cyber Resiliency

  10. Countering the Attack: How Zero Trust is Pushing Back Against New Cyberthreats

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.