As we observe the 20th anniversary of of Cybersecurity Awareness Month, I thought it was time for us to revisit some common good practices for remote computing. Please make use of the IDSA resources and consider joining to unlock access for even more! About the Author: Jeff Reich, CISSP, CRISC, ITIL – Executive Director of…
Archives
-
SailPoint: How identity security can be a business accelerator.
This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…
-
Why Identity is the First Line of Cybersecurity Defense
Identity has rapidly evolved to become organizations’ first line of defense against increasingly sophisticated cybersecurity threats. This evolution has made identity a business enabler and a critical board-level topic. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied…