Archives

  1. The Guide to Identity Defined Security

    Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…

  2. Best Practices for Managing Access to Modern Stacks

  3. Top Active Directory Attacks and How to Prevent Them

  4. 2021 Trends in Securing Digital Identities

    The results of this year’s research, 2021 Trends in Securing Digital Identities, made it clear that the overnight shift to an online world had a significant impact on how organizations approach the people, process, and technology aspects of securing digital identities. COVID-19 put the spotlight on the importance of securing digital identities and provided the…

  5. Adobe Finds ZEN Using Identity-Centric Security

    As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…

  6. Identity Management Day 2021: Why Identity Management Matters

  7. Why Identity Defined Security?

    We live in an increasingly connected world. In addition, the recent shift to remote working has significantly increased the risk of a cyber security attack due to compromised identities, accounts and credentials. The issue of identity, and its inherent connection to security, is more important than ever. We surveyed over 500 identity and security leaders to find…

  8. Ditch Siloed IAM – Convergence is Key to Driving Optimum Cloud Security

    For today’s enterprises, the demands of securing hybrid workforces, cloud environments, and digital transformation initiatives have placed identity at the center of strategic discussions about security. Identity is the link that connects users to the devices, services, and applications they use during a time when the traditional perimeter has been eroded. But managing identity and…

  9. Introducing the CISO Chronicles: The Gathering Storm

    Storytelling in business is not a new concept and can take many forms. From real life customer case studies that highlight challenges, solutions, and benefits, to a business fable such as, The 5 Dysfunctions of a Team, focused on business management and leadership, or The Phoenix Project, A Novel About IT, DevOps, and Helping Your Business Win, which provides IT…

  10. Achieving Passwordless for People & Machines

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.