Archives

  1. 2022 Trends in Securing Digital Identities

    Identity-related breaches continue to plague organizations with significant business impacts, but investments and executive leadership support are making a difference.

  2. 2022 Trends in Securing Digital Identities

    Managing identities accessing enterprise resources has become significantly more complicated over the last several years. Between the increasing number and expanding types of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under tremendous pressure to ensure that remote workers, contractors, and employees are accessing network resources securely…

  3. Identity Defined Security Framework

    We live in an increasingly connected and remote world. The issue of identity, and its inherent connection to security, is more important than ever. Identity-related breaches have become ubiquitous in the last 2 years [READ THE REPORT]. A lack of Identity and Access Management (IAM) maturity, an over-abundance of complex security technologies and confusion over…

  4. CISO CHRONICLES: THE GATHERING STORM Episode 1

    The conference call was brief. Tense, on our end, but brief. “Mr. Vinston, we were able to negotiate them down to $3 million,” the voice on the other end of the call told our CEO. “My advice is to weigh that amount against the cost of rebuilding your environment, PR damage, and the business disruption.”…

  5. The Path to Zero Trust Starts with Identity

    Despite its origin almost 15 years ago, Zero Trust is more relevant today, than ever before.  Your user communities have expanded, the amount of data being created is growing exponentially, and the traditional network perimeter has disappeared. It’s no longer feasible to protect your most sensitive assets behind a single network wall.  Hackers are using…

  6. 2021 Trends in Securing Digital Identities

    The past year represented a significant disruption for organizations and increased the workload for most identity and security teams. It forced organizations to recognize the importance of securing digital identities, whether maintaining employee productivity through secure access from anywhere, using any device, or transforming engagement with customers to secure online services. Did this unprecedented shift…

  7. Identity and Access Management: The Stakeholder Perspective

    The number of identities managed in the enterprise is exploding (52% say that identities have grown more than five-fold in the past 10 years), organizations struggle to align identity and security teams (only half (53%) report that security has any level of ownership for workforce IAM) and 94% of organizations have had an identity-related breach), which 99%…

  8. Identity Security: A Work in Progress

    Identity-related breaches have become ubiquitous in the last 2 years, with most organizations believing the breach could have been prevented through identity access management (IAM), education, better organizational alignment and integrated technology solutions. Research conducted in 2020 by the Identity Defined Security Alliance highlights the trends in identity security, including identity-related breaches in IT security…

  9. How Security Teams Are Addressing Risk

    Despite significant spending on IT security solutions and identity and access management technologies, compromised identities still represent a real threat to enterprises.  Why are so many companies still struggling with reducing the risk of a breach from inadvertent misuse by insiders to an external attack targeting a business partner’s servers or users? This report, based…

  10. LogRhythm’s Journey to Identity-Centric Zero Trust

    LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics.  The path to Zero Trust is multi-phased, but once fully…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.