Archives

  1. 2021 Trends in Securing Digital Identities

    The past year represented a significant disruption for organizations and increased the workload for most identity and security teams. It forced organizations to recognize the importance of securing digital identities, whether maintaining employee productivity through secure access from anywhere, using any device, or transforming engagement with customers to secure online services. Did this unprecedented shift…

  2. Identity and Access Management: The Stakeholder Perspective

    The number of identities managed in the enterprise is exploding (52% say that identities have grown more than five-fold in the past 10 years), organizations struggle to align identity and security teams (only half (53%) report that security has any level of ownership for workforce IAM) and 94% of organizations have had an identity-related breach), which 99%…

  3. Identity Security: A Work in Progress

    Identity-related breaches have become ubiquitous in the last 2 years, with most organizations believing the breach could have been prevented through identity access management (IAM), education, better organizational alignment and integrated technology solutions. Research conducted in 2020 by the Identity Defined Security Alliance highlights the trends in identity security, including identity-related breaches in IT security…

  4. How Security Teams Are Addressing Risk

    Despite significant spending on IT security solutions and identity and access management technologies, compromised identities still represent a real threat to enterprises.  Why are so many companies still struggling with reducing the risk of a breach from inadvertent misuse by insiders to an external attack targeting a business partner’s servers or users? This report, based…

  5. LogRhythm’s Journey to Identity-Centric Zero Trust

    LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics.  The path to Zero Trust is multi-phased, but once fully…

  6. The Guide to Identity Defined Security

    Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…

  7. Best Practices for Managing Access to Modern Stacks

  8. Top Active Directory Attacks and How to Prevent Them

  9. 2021 Trends in Securing Digital Identities

    The results of this year’s research, 2021 Trends in Securing Digital Identities, made it clear that the overnight shift to an online world had a significant impact on how organizations approach the people, process, and technology aspects of securing digital identities. COVID-19 put the spotlight on the importance of securing digital identities and provided the…

  10. Adobe Finds ZEN Using Identity-Centric Security

    As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.