Archives

  1. The Guide to Identity Defined Security

    Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…

  2. 2021 Trends in Securing Digital Identities

    The results of this year’s research, 2021 Trends in Securing Digital Identities, made it clear that the overnight shift to an online world had a significant impact on how organizations approach the people, process, and technology aspects of securing digital identities. COVID-19 put the spotlight on the importance of securing digital identities and provided the…

  3. Adobe Finds ZEN Using Identity-Centric Security

    As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…

  4. Identity Management Day 2021: Why Identity Management Matters

  5. Why Identity Defined Security?

    We live in an increasingly connected world. In addition, the recent shift to remote working has significantly increased the risk of a cyber security attack due to compromised identities, accounts and credentials. The issue of identity, and its inherent connection to security, is more important than ever. We surveyed over 500 identity and security leaders to find…

  6. Ditch Siloed IAM – Convergence is Key to Driving Optimum Cloud Security

    For today’s enterprises, the demands of securing hybrid workforces, cloud environments, and digital transformation initiatives have placed identity at the center of strategic discussions about security. Identity is the link that connects users to the devices, services, and applications they use during a time when the traditional perimeter has been eroded. But managing identity and…

  7. Introducing the CISO Chronicles: The Gathering Storm

    Storytelling in business is not a new concept and can take many forms. From real life customer case studies that highlight challenges, solutions, and benefits, to a business fable such as, The 5 Dysfunctions of a Team, focused on business management and leadership, or The Phoenix Project, A Novel About IT, DevOps, and Helping Your Business Win, which provides IT…

  8. Security, Privacy and Convenience: Why Can’t We Have It All?

    Earlier this year, the backlash against the IRS over the use of facial recognition technology to authenticate taxpayers signing up for online accounts caused the agency to abruptly change course. This situation is part of a familiar pattern, where privacy concerns regularly butt up against technology and innovation, which are accelerating faster than ever. As…

  9. How to Recruit the Right Cybersecurity Talent

  10. Why Managing and Securing Digital Identities is a Must

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.