Archives

  1. Security, Privacy and Convenience: Why Can’t We Have It All?

    Earlier this year, the backlash against the IRS over the use of facial recognition technology to authenticate taxpayers signing up for online accounts caused the agency to abruptly change course. This situation is part of a familiar pattern, where privacy concerns regularly butt up against technology and innovation, which are accelerating faster than ever. As…

  2. CIEM 101: Understanding CIEM Fundamentals for Effective Multicloud Security Enablement

  3. How to Recruit the Right Cybersecurity Talent

  4. Why Managing and Securing Digital Identities is a Must

  5. Making the Business Case for Identity Security

    Identity is at the front line of security, in a world where one social engineering attack can bring down an empire, everyone is on guard. As a security leader, identity security should be on the Board’s radar, but how do you get their interest and why look to the IDSA as a resource? There’s two parts…

  6. Identity Management Day: Protecting Identities in the Expanding Threatscape

    The Identity Defined Security Alliance (IDSA) is proud to host the second annual Identity Management Day, in partnership with the National Cybersecurity Alliance (NCA). The NCA is on a mission to empower a more secure interconnected world and the IDSA believes that identity is the critical path to make that vision a reality. Therefore, in 2021 we launched Identity…

  7. Identity Management Champions: Identity Security is Everyone’s Responsibility

    Identity Management Day is about raising awareness of the importance of identity management and securing digital identities, and sharing best practices to help organizations and consumers #beidentitysmart. This year we are proud to recognize almost 200 individuals and organizations who are prioritizing identity management and security as Identity Management Champions. Find out what they have to say…

  8. You Have a Standing Privilege Problem and Just Don’t Know It

    The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…

  9. Identity – Don’t Forget About the Device

    The word “identity” has always made us think of a person’s identity. However, over the past 20 years the meaning of the term has evolved subtly. This evolution focused mainly on the shift from a human identity to privileged identities and then to generic accounts and application-based accounts. But the last five years or so…

  10. Building Your IT/Security Career by Taking Risks

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.