Archives

  1. Privilege Sprawl Index: Modeling Privilege Access Sprawl for Zero Trust Security

  2. Sensible 2022 Resolutions for Behavioral-Aware, Identity-First Security

    In our human life, we are used to continuous checks and controls based on what we do every day, our daily behaviors. Imagine a world where a speedometer only periodically displayed how fast you were driving, and there were no police, speed limits, or traffic lights. How safe would the roads be? The digital streets…

  3. What is Identity and Access Management?

  4. Wrapping Up #BeIdentitySmart Week

    In April we partnered with the National Cybersecurity Alliance (NCA) on the first ever Identity Management Day to raise awareness about the importance of securing digital identities. For 18 years the NCA has hosted Cybersecurity Awareness Month to ensure organizations and individuals have the resources they need to stay safer and more secure online. In recent years,…

  5. Identity Security and Artificial Intelligence

    Mention ‘Artificial Intelligence (AI)’ or ‘Machine Learning (ML)’ in conversation, and thoughts immediately jump to images of time-traveling cyborgs, global nuclear war simulations, and pod bay doors. While these front-of-mind examples make for good entertainment, they will (hopefully) stay in the realm of mostly-fiction. The reality is that artificial intelligence, and its subgenre machine learning,…

  6. #BeIdentitySmart Week: Improving Identity Insights with Artificial Intelligence and Machine Learning

    We asked our champions for their best advice on Improving Identity Insights with Artificial Intelligence and Machine Learning. See below for their responses and we’d love to hear your perspective, too! Share your response on Twitter and join us in raising awareness of the importance of identity management and securing digital identities by sharing all of…

  7. #BeIdentitySmart Week: Applying Identity to DevSecOps Tools and Processes

    We asked our champions for their best advice on Applying Identity to DevSecOps Tools and Processes. See below for their responses and we’d love to hear your perspective, too! Share your response on Twitter and join us in raising awareness of the importance of identity management and securing digital identities by sharing all of your best…

  8. Applying Identity to DevSecOps Tools and Processes

    Keeping your applications and infrastructure secure is a significant concern for most organizations. But you need to balance the inertia of ongoing development, maintenance, and deployment against the friction of making sure those tasks are secure and your deployed apps and infrastructure remain secure. As a streamlined DevOps practice, automated Continuous Integration/Continuous Delivery (CI/CD) pipelines…

  9. Identity-Focused Security Controls Prevail

  10. Protecting Machine Identities in the Automation-First Era

    Pandemic-driven shifts to distributed work models, large-scale investments in SaaS and cloud services and strong focus on digital transformation has brought a surge in new identities in the enterprise. According to IDSA research, 83% of organizations experienced an increase in identities since last year, with one in five reporting the number of identities they manage increased by…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.