Archives

  1. How Convergent Identity-Based Security Reduces Risk, Increases Efficiency

    This blog was originally published by Bravura Security here.   In an era where 80% of data breaches involve compromised credentials and privilege escalation, traditional identity and access management (IAM) and privileged access management solutions (PAM) solutions are falling behind. While organizations have invested millions in layered implementations rooted in traditional enterprise approaches, these solutions…

  2. 2025’s Identity Security Storm: AI, IoT and Emerging Threats

    This blog was originally published by Bravura Security here. A stark reality faces modern enterprises: 94% of cyber attacks now specifically target identity systems, not traditional network defenses. As threats rapidly evolve, organizations struggling with fragmented identity and access management (IAM), privileged and access management (PAM), and password management architectures face increasing risk from sophisticated…

  3. Why You Should Say Goodbye to Manual Identity Processes

    As revealed in Cerby’s 2025 Identity Automation Gap Report, 46% of security and IT leaders say their organization has already experienced a security, compliance, or operational issue directly caused by manual identity workflow execution. Why do manual identity workflows continue to exist, when the consequences of getting them wrong are so serious and when automation…

  4. How to Prevent $4M Breaches with Unified IAM and PAM Defense

    The identity security landscape has reached a critical tipping point. As AI-powered attack tools become readily available, attackers target identity credentials and privileged access with unprecedented sophistication and scale. Traditional fragmented security approaches are crumbling under the weight of automated threats that can simultaneously exploit both identity and privilege vulnerabilities.  According to EMA Research, the…

  5. Compliance and Unified Identity Security in Financial Services

    With all the sensitive data financial institutions collect, it should come as no surprise that the financial services industry is one of the top targets for cybercriminals. That’s also why compliance with stringent regulations and standards is so important — in fact, it’s essential for doing business. In the interconnected financial landscape, managing multiple point solutions for compliance…

  6. 5 Things I learned delivering Zero Trust at Adobe and Cisco

    This blog was originally published by 909Cyber here.   Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…

  7. Why Identity Automation Fails at 96% of Organizations

    This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage access and monitor risk. But when it comes to executing identity processes and decisions, our latest research reveals that 96% of organizations still rely on manual workflows.  …

  8. What is Next-Gen IGA?

    Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different?  Let’s start with a trip on the way back machine and look at the evolution of these technologies to date. Skipping past the work on e-mail…

  9. Identity and Access Management in the AI Era: 2025 Guide

    The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…

  10. How to Manage Disconnected Applications with Your Identity Program

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.