Archives

  1. Is Your Cloud Security Starting to Feel like A Game of Whac-A-Mole?

    Whac-A-Mole is a timeless arcade classic with a simple goal: when a mole pops up, whack it back into its hole. Inevitably, however, a few of those pesky, popping creatures seem to evade the wrath of the jumbo cushioned mallet at the very last second. I was reminded of this game when I read a recent…

  2. Navigating the Modern Identity Landscape: Successful Transformation Strategies

  3. Going back to Zero: A Primer on Zero Trust

    We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…

  4. Shifting your IAM Program from Compliance-Driven to Security-Driven

  5. Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

  6. Pandemic Put Identity Security in the Spotlight, CISO Opportunity Awaits

    In May of 2020 we published our first research specific to identity-related breaches, Identity Security: A Work in Progress, in which we found that 94% of organizations had suffered an identity-related breach and 79% just in the last 2 years. In short, identity-related breaches were ubiquitous. Some organizations however, those with an identity-forward culture, had suffered…

  7. The Most Sensitive Cloud Configuration You’re Ignoring

    Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…

  8. Authentication Requirements for the Presidential Executive Order

  9. Privilege Abuse: What is the Risk and What Can You Do?

  10. Identity management is now mostly about security

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.