Archives

  1. Identity Management Day: Protecting Identities in the Expanding Threatscape

    The Identity Defined Security Alliance (IDSA) is proud to host the second annual Identity Management Day, in partnership with the National Cybersecurity Alliance (NCA). The NCA is on a mission to empower a more secure interconnected world and the IDSA believes that identity is the critical path to make that vision a reality. Therefore, in 2021 we launched Identity…

  2. Identity Management Champions: Identity Security is Everyone’s Responsibility

    Identity Management Day is about raising awareness of the importance of identity management and securing digital identities, and sharing best practices to help organizations and consumers #beidentitysmart. This year we are proud to recognize almost 200 individuals and organizations who are prioritizing identity management and security as Identity Management Champions. Find out what they have to say…

  3. You Have a Standing Privilege Problem and Just Don’t Know It

    The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…

  4. Identity – Don’t Forget About the Device

    The word “identity” has always made us think of a person’s identity. However, over the past 20 years the meaning of the term has evolved subtly. This evolution focused mainly on the shift from a human identity to privileged identities and then to generic accounts and application-based accounts. But the last five years or so…

  5. Building Your IT/Security Career by Taking Risks

  6. Best Practice: Enabling Visibility as Part of Cloud Infrastructure Entitlements Management (CIEM)

    Today’s modern enterprises rely heavily on cloud infrastructure, and permissions are essentially the backbone of access to cloud based resources. To effectively manage entitlements – access to your organization’s resources such as sensitive data and mission critical assets – the core proficiencies you need are: access to an inventory of all your cloud identities and…

  7. Identity Management Day 2022 Best Practices for Organizations

    The breaches that have occurred in the last year should be a rally cry for implementing basic identity management principles and evidence that an identity-related breach can happen to an organization of any size and have significant repercussions. As we approach the second annual Identity Management Day, hosted by the Identity Defined Security Alliance and National…

  8. Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps

  9. Identity Security and AI: Access Requests and Provisioning

    In a blog published in October (Identity Security and Artificial Intelligence), as part of #BeIdentitySmart week, the AI/ML Technical Working Group subcommittee outlined a blog series that will explore how Artificial Intelligence and Machine Learning are being utilized today, and how they can be used in the future to provide organizations with more effective Identity Security….

  10. Unified Identity Protection – Turning Zero Trust to Reality

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.