Archives

  1. A decade of identity evolution forced into one chaotic year. What’s next?

  2. New CIO or Head of IT? Make a Fast, Positive Impact with Identity

    On any given day, the person running IT’s real job is: PPS—professional problem solver. The set of problems they’re tasked with solving changes every day: increase business process efficiency through automation; facilitate software development and release through DevOps principles; maintain and enhance security. Against this landscape, CIOs also have another challenge: to surprise and delight…

  3. An Identity-Centric Approach to Harden a COVID-19 Critical Business

  4. Avoid the 4 Identity Program Booby Traps

    Sometimes the hardest part of a journey can be its first step. As organizations try to keep up with the demands of digital transformation and cloud adoption, starting an identity program can be a daunting process. Between customers, employees, and non-human identities such as systems and applications, there is a lot to think about—and a…

  5. IAM Best Practices Blog Series: The Importance of an Authoritative Identity Source

    How much do you really know about those with access to your resources? As a company that hires employees, we know a lot about them before we give them access. We spend a lot of time vetting them and their appropriateness for a role or position. Teams are dedicated to finding and hiring the right…

  6. New Technical Working Group Subcommittees Chartered to Expand Guidance for Identity and Security Professionals

    We’re excited to announce a significant expansion to our research and development efforts with the addition of 6 new Technical Working Group (TWG) subcommittees that encompass everything from the basics of best practices to innovations at the intersection of identity and security. Through our Technical Working Group, IDSA technology and solution provider members come together to…

  7. Adapting the IDSA Framework to Keep Pace with Evolution of Identity and Security Industry

    Today we are excited to announce the latest adaptation of the Identity Defined Security Framework, which offers practical, vendor-neutral guidance on how to achieve identity-centric security. The update is the culmination of numerous whiteboards, conference calls, and a two-day Technical Working Group workshop in San Francisco, where over 15 IDSA member companies came together to discuss…

  8. Zero Trust: Where Do You Start?

    With the Zero Trust Myths out of the way, where do you start? Zero Trust is a philosophy, a set of guiding principles that can be used to improve the security posture of an organization and reduce the risk of a breach by limiting lateral movement. Implementing Zero Trust is more than simply implementing a “Zero Trust”…

  9. Continuing Momentum with New Members, New Framework, and Security Leader Panel at RSA Conference 2020

    It’s only 56 days in to 2020 and we are already excited about the continuing momentum into the new decade!  We are pleased to announce two new vendor members to the Alliance — Avatier and ForgeRock — and thrilled to add their voices and expertise to our team of identity and security leaders. In addition, we have provided our latest…

  10. IAM Best Practices Blog Series: Why it is Critical to Establish an IAM Governance Committee

    In previous IAM Best Practices blogs my fellow customer advisory board members dove into identity ownership, ensuring identity uniqueness, where to start with provisioning and de-provisioning, discovery of assets for privileged access and establishing processes for incorporating IAM into new applications. In this blog post, I will explain why it is critical to establish a governance committee as part of identity and access…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.