Archives

  1. New CIO or Head of IT? Make a Fast, Positive Impact with Identity

    On any given day, the person running IT’s real job is: PPS—professional problem solver. The set of problems they’re tasked with solving changes every day: increase business process efficiency through automation; facilitate software development and release through DevOps principles; maintain and enhance security. Against this landscape, CIOs also have another challenge: to surprise and delight…

  2. An Identity-Centric Approach to Harden a COVID-19 Critical Business

  3. Tighter identity and asset management is essential to WFH security

  4. The Implications of Bring Your Own Identity

    When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to…

  5. Avoid the 4 Identity Program Booby Traps

    Sometimes the hardest part of a journey can be its first step. As organizations try to keep up with the demands of digital transformation and cloud adoption, starting an identity program can be a daunting process. Between customers, employees, and non-human identities such as systems and applications, there is a lot to think about—and a…

  6. Healthcare Security Fireside Chat: NIST, Identity, and Ransomware

  7. The Unique Challenges of Customer Identity and Access Management

    As the world faced quarantines, stay at home orders and shuttered businesses, even normally reluctant consumers were forced to go online to grocery shop, order take-out and stay connected to friends and family. This focus on transacting daily tasks on-line placed a major spotlight on an emerging subset of identity security, customer identity and access…

  8. Mission Possible: Better Identity Through Public/Private Sector Collaboration

    One of the most entertaining parts of the Mission Impossible movies is watching the characters don masks of targets they want to impersonate and slip into and out of the secret identities like gloves. In the digital world, impersonating people is much simpler. Thankfully, government officials and the consumers they represent appear to want to change that. In…

  9. Privileged Access Management Starts with Endpoint Privilege

    Investigate any data breach impacting today’s enterprises, and you will likely find evidence of credential theft and lateral movement by attackers. Stopping threat actors from gaining persistence and deepening their compromise once they have gotten through the digital door remains part of the daily routine of security professionals. In a traditional work environment, an employee…

  10. Identity-Centric Security Empowers Businesses

    Between the explosive growth of enterprise mobility and the increased adoption of cloud services, the number of workforce identities has skyrocketed. Accompanying that increase is a sobering statistic: according to a recent survey by the Identity Defined Security Alliance (IDSA), 79% of security and identity professionals say their company has experienced an identity-related breach in…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.