This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…
Archives
-
Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP)
For today’s enterprises, security must adapt to the dynamic needs of the environments and the users. That takes integration and the ability to use everything from device characteristics to user behavior to make decisions about access and authentication. However, this integration and interoperability can be hard to come by. As organizations look to Zero Trust…
-
The Identity Threat Detection and Response Lifecycle
Identity pros have long understood that identity is the new security perimeter. Identity systems like Active Directory (AD)—the primary identity store in use today—are primary targets for cyberattacks. By gaining access to AD, attackers can eventually grab the types of elevated privileges necessary to steal company and user data and intellectual property and to lock…