Archives

  1. Enterprise Password Management: A Secure Access Checklist

    This blog was originally published here IT Admins and CISOs in today’s enterprise environments face mounting challenges in managing passwords across sprawling user bases, applications, and devices. In industries like financial services, higher education, and energy, the stakes are even higher: a single compromised password can lead to data breaches, regulatory penalties, and reputational damage….

  2. The Rise of Agentic AI Security

    Here at IDSA, we have the pleasure of hosting the second annual NHIcon by member company Aembit. You will hear more from us on this as we get into the new year. For now, let’s give you a sneak peek of some of what you will see at NHIcon 2026 on January 27, 2026. For…

  3. From AAA to Assurance: How the UK Telecoms Security Act Is Shaping Identity-Based Network Control

    Introduction As CISOs, we often face regulations that seem far removed from the practical realities of running identity and access infrastructure. The UK’s Telecommunications Security Act (TSA) and its accompanying Code of Practice mark a significant shift in that dynamic. Identity and privileged access management are no longer back-office hygiene tasks; they are front-line compliance…

  4. Identity and Access Management and Identity Governance Explained

    Mitigating identity-related access risks is critical as organizations face evolving threats daily. As businesses shift to multi-cloud and hybrid environments, identity sprawl such as shadow IT and unmanaged SaaS apps has become a top attack vector. Identity and access management (IAM) and identity governance and administration (IGA) must now secure identities beyond corporate perimeters, spanning AWS, Azure, Google Cloud, and SaaS platforms…

  5. Break Glass Accounts – Risk or Required

    We have all seen the sign, “In case of fire, break glass, and pull alarm.” While this necessary mitigating control for fire safety is explicitly known and present in almost every building, an analogy translates into the cybersecurity landscape as “break glass accounts.” In fact, few risk-mitigating controls stir as much debate among CISOs as…

  6. 5 Reasons Disconnected Apps Are An Enterprise Risk You Can No Longer Ignore

    Companies of every size depend on Identity and Access Management (IAM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM) to secure logins, enforce policies, and meet compliance requirements. These platforms are the backbone of modern identity security. But there’s a problem: they can only secure what they connect to. The apps that don’t…

  7. How Convergent Identity-Based Security Reduces Risk, Increases Efficiency

    This blog was originally published by Bravura Security here.   In an era where 80% of data breaches involve compromised credentials and privilege escalation, traditional identity and access management (IAM) and privileged access management solutions (PAM) solutions are falling behind. While organizations have invested millions in layered implementations rooted in traditional enterprise approaches, these solutions…

  8. Why You Should Say Goodbye to Manual Identity Processes

    As revealed in Cerby’s 2025 Identity Automation Gap Report, 46% of security and IT leaders say their organization has already experienced a security, compliance, or operational issue directly caused by manual identity workflow execution. Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when automation…

  9. 5 Things I learned delivering Zero Trust at Adobe and Cisco

    This blog was originally published by 909Cyber here.   Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…

  10. Mastering Financial Services Compliance With IAM and PAM

    This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.