Archives

  1. Identity and Access Management: The Stakeholder Perspective

    The number of identities managed in the enterprise is exploding (52% say that identities have grown more than five-fold in the past 10 years), organizations struggle to align identity and security teams (only half (53%) report that security has any level of ownership for workforce IAM) and 94% of organizations have had an identity-related breach), which 99%…

  2. Identity Security: A Work in Progress

    Identity-related breaches have become ubiquitous in the last 2 years, with most organizations believing the breach could have been prevented through identity access management (IAM), education, better organizational alignment and integrated technology solutions. Research conducted in 2020 by the Identity Defined Security Alliance highlights the trends in identity security, including identity-related breaches in IT security…

  3. How Security Teams Are Addressing Risk

    Despite significant spending on IT security solutions and identity and access management technologies, compromised identities still represent a real threat to enterprises.  Why are so many companies still struggling with reducing the risk of a breach from inadvertent misuse by insiders to an external attack targeting a business partner’s servers or users? This report, based…

  4. The Guide to Identity Defined Security

    Being a security leader in today’s dynamic environment is a challenge. They are constantly fending off increasingly sophisticated attacks, usually with limited resources and minimal Board support. The attack surfaces are expanding as organizations support a remote workforce, adopt cloud strategies, and take on digital transformation initiatives. The consequences of a breach are shifting from…

  5. Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps

  6. Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

  7. Defining Identity Defined Security

    The language of all things technical – science, medicine, technology – can be confusing. To make matters worse, in the technical world and more specifically cybersecurity we are famous for evolving or conflating terms that can often create confusion with our customers and the broader industry. The latest example is the evolution (and perhaps confusion)…

  8. Going back to Zero: A Primer on Zero Trust

    We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…

  9. Identity Matters – Applying an Identity-Centric Security Strategy in Healthcare

  10. IAM Stakeholder Perspective on Access Challenges, Business Operations and Risk

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.