Archives

  1. Why Identity Automation Fails at 96% of Organizations

    This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage access and monitor risk. But when it comes to executing identity processes and decisions, our latest research reveals that 96% of organizations still rely on manual workflows.  …

  2. What is Next-Gen IGA?

    Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different?  Let’s start with a trip on the way back machine and look at the evolution of these technologies to date. Skipping past the work on e-mail…

  3. Identity and Access Management in the AI Era: 2025 Guide

    The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…

  4. How to Manage Disconnected Applications with Your Identity Program

  5. The Broken State of Least Privilege: Reimagining a New Approach

  6. SailPoint: How identity security can be a business accelerator.

    This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…

  7. MFA Fatigue: Fighting a 2-Front War

  8. Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP)

    For today’s enterprises, security must adapt to the dynamic needs of the environments and the users. That takes integration and the ability to use everything from device characteristics to user behavior to make decisions about access and authentication. However, this integration and interoperability can be hard to come by. As organizations look to Zero Trust…

  9. The Identity Threat Detection and Response Lifecycle

    Identity pros have long understood that identity is the new security perimeter. Identity systems like Active Directory (AD)—the primary identity store in use today—are primary targets for cyberattacks. By gaining access to AD, attackers can eventually grab the types of elevated privileges necessary to steal company and user data and intellectual property and to lock…

  10. Identity as the First Line of Digital Defense for Cybersecurity

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.