Archives

  1. You Have a Standing Privilege Problem and Just Don’t Know It

    The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…

  2. Privilege Sprawl Index: Modeling Privilege Access Sprawl for Zero Trust Security

  3. Beyond Best Practices TWG Brings New Insights and Also… Sharks?

    As we celebrate the first-ever Identity Management Day, I had a chance to reflect on the Beyond Best Practices Technical Working Group’s contributions over the past year, and one word came to mind: Creativity. It’s the one skill that underpins nearly every successful identity management team. Whether it’s finding a way to glue together the Active…

  4. Identity Management Day: What Sharks and Your Identity Program Have in Common

    Legend has it that in 1988 the idea for Shark Week was hatched over a round of drinks and documented on the back of a napkin as an awesome (and fun) way to capture more viewers. Seems like it worked: Discovery Channel viewers doubled after the very first Shark Week. Fast forward to 2021, and…

  5. New CIO or Head of IT? Make a Fast, Positive Impact with Identity

    On any given day, the person running IT’s real job is: PPS—professional problem solver. The set of problems they’re tasked with solving changes every day: increase business process efficiency through automation; facilitate software development and release through DevOps principles; maintain and enhance security. Against this landscape, CIOs also have another challenge: to surprise and delight…

  6. An Identity-Centric Approach to Harden a COVID-19 Critical Business

  7. The Unique Challenges of Customer Identity and Access Management

    As the world faced quarantines, stay at home orders and shuttered businesses, even normally reluctant consumers were forced to go online to grocery shop, order take-out and stay connected to friends and family. This focus on transacting daily tasks on-line placed a major spotlight on an emerging subset of identity security, customer identity and access…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.