The past year represented a significant disruption for organizations and increased the workload for most identity and security teams. It forced organizations to recognize the importance of securing digital identities, whether maintaining employee productivity through secure access from anywhere, using any device, or transforming engagement with customers to secure online services. Did this unprecedented shift…
Archives
-
Identity Security: A Work in Progress
Identity-related breaches have become ubiquitous in the last 2 years, with most organizations believing the breach could have been prevented through identity access management (IAM), education, better organizational alignment and integrated technology solutions. Research conducted in 2020 by the Identity Defined Security Alliance highlights the trends in identity security, including identity-related breaches in IT security…
-
LogRhythm’s Journey to Identity-Centric Zero Trust
LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics. The path to Zero Trust is multi-phased, but once fully…
-
The Guide to Identity Defined Security
Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…
-
Adobe Finds ZEN Using Identity-Centric Security
As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…