Archives

  1. Transforming Experience Through Customer Identity and Access Management (CIAM)

    Customers are the reason most businesses exist. Whether it’s healthcare, finance, retail, manufacturing, or entertainment, a business cannot succeed without customer interaction. It’s interesting to observe how this dynamic has changed over time. Today it is very clear that the customer is in control of this relationship, and much of the decision to continue the…

  2. Zero Trust Myth Series: Going Beyond the Network

    First impressions die hard. When the concept of Zero Trust was first introduced, the focus was on segmenting, isolating, and controlling network traffic. Today, however, those ideas represent only one fraction of a Zero Trust strategy. On my list of Zero Trust myths, the second fallacy I noted was the idea that Zero Trust focuses solely on…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.