Identity-related breaches continue to plague organizations with significant business impacts, but investments and executive leadership support are making a difference.
Archives
-
Identity Defined Security Framework
We live in an increasingly connected and remote world. The issue of identity, and its inherent connection to security, is more important than ever. Identity-related breaches have become ubiquitous in the last 2 years [READ THE REPORT]. A lack of Identity and Access Management (IAM) maturity, an over-abundance of complex security technologies and confusion over…
-
The Path to Zero Trust Starts with Identity
Despite its origin almost 15 years ago, Zero Trust is more relevant today, than ever before. Your user communities have expanded, the amount of data being created is growing exponentially, and the traditional network perimeter has disappeared. It’s no longer feasible to protect your most sensitive assets behind a single network wall. Hackers are using…
-
Identity Security: A Work in Progress
Identity-related breaches have become ubiquitous in the last 2 years, with most organizations believing the breach could have been prevented through identity access management (IAM), education, better organizational alignment and integrated technology solutions. Research conducted in 2020 by the Identity Defined Security Alliance highlights the trends in identity security, including identity-related breaches in IT security…
-
LogRhythm’s Journey to Identity-Centric Zero Trust
LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics. The path to Zero Trust is multi-phased, but once fully…