Archives

  1. Guest Blog: A Community Vision, A Team Game Approach and a Call to Action for Tomorrow’s CISOs

    We recently sat down with Adam Bosnian, Identity Defined Security Alliance (IDSA) executive advisory board member and EVP of global business development at CyberArk, to discuss the importance of collaborative, identity-centric security and the evolving role of the CISO in the digital transformation age. Here’s a summary of what he had to say: Can you describe how…

  2. Identity Defined Security Alliance Adds New Members

    As we wrap up a great year for the Identity Defined Security Alliance, we are pleased to announced four new vendor members to the Alliance: Omada, Remediant, Saviynt and SecZetta.  We are excited to have these identity and security leaders join us in our mission to help organizations reduce risk by providing education, best practices and resources to implement identity…

  3. The State of Identity: With Explosive Identity Growth, Organizational Disconnects Creating Security Risk

    The Identity Defined Security Alliance (IDSA) has developed its vision and mission based on several challenges faced by IT organizations – Compromised identities are the leading cause of breaches. There is an over-abundance of complex security technologies and confusion over where to start. Effective security strategies require the use of multiple solutions that must integrate…

  4. Zero Trust Myth Series: Going Beyond the Network

    First impressions die hard. When the concept of Zero Trust was first introduced, the focus was on segmenting, isolating, and controlling network traffic. Today, however, those ideas represent only one fraction of a Zero Trust strategy. On my list of Zero Trust myths, the second fallacy I noted was the idea that Zero Trust focuses solely on…

  5. Zero Trust Myth Series: What’s Old is New Again, with a Twist

    There was a time when defending the perimeter was the focus of IT security. By necessity, those days have long passed. Between insider threats, credential-stealing malware, and social engineering, today’s businesses need to secure more than the gate around the castle. They must defend the doors inside the castle itself. This reality has brought Zero…

  6. Healthcare CISOs Push the Importance of Identity

    Last week H-ISAC, a trusted community of critical infrastructure owners and operators within the Health Care and Public Health sector (HPH), published a new paper titled “Identity for the CISO Not Yet Paying Attention to Identity.”  The paper, authored by a technical working group of healthcare CISOs, is the first in a series focused on…

  7. Identity Defined Security Alliance Publishes New Guidance on Zero Trust

    Alliance to share vision for changing security paradigm, and how putting identity at the center will help organizations leverage existing investments while reducing risk, at Black Hat USA 2019 DENVER, July 24, 2019 — The Identity Defined Security Alliance (IDSA), an industry alliance that helps organizations leverage existing cybersecurity investments to establish a stronger security posture, today…

  8. LogRhythm’s Journey to Identity-Centric Zero Trust

    The original Zero Trust model was developed by Forrester in 2010, but not fully embraced until Google successfully developed and implemented their version of Zero Trust, Beyond Corp, almost six years later. Let’s explore what exactly the Zero Trust model is and what it means to implement one. This shifts away from the large, corporate perimeters, with layered-in…

  9. Zero Trust in the Identity-Defined World

    The Origins of Zero Trust The Zero Trust model was established in 2010 by Forrester analyst John Kindervag and has enjoyed a fascinating and somewhat tumultuous 10-year history. It was born out of a period of increased and sustained breach activity combined with a growing frustration that existing security approaches were falling short of addressing…

  10. Identity as a National Critical Function

    New DHS Designation Highlights the Importance of Identity Management to the Nation Generate Electricity. Supply Water. Transport Cargo and Passengers by Rail. Provide Identity Management Services. One of these things is not like the others. The first three are all things most people would consider to be “national critical functions” – what the U.S. Department…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.