In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…
Archives
-
What is Next-Gen IGA?
Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different? Let’s start with a trip on the way back machine and look at the evolution of these technologies to date. Skipping past the work on e-mail…
-
Six Identity Governance Trends to Follow in 2025
Omada surveyed 502 IT and business leaders responsible for identity governance, access management, compliance, cybersecurity, and general IT administration to uncover the latest trends in identity governance across large organizations. The full results appear in The State of Identity Governance 2025. If you’re looking to strengthen your Identity Governance and Administration (IGA) strategy for 2025…
-
Beyond the Workforce: Protecting Your Organization’s Expanding Identity Landscape
This blog was originally posted by Oleria. You can read the original blog here. Identity security is forcing its way to the top of the CISO priority list as 9 in 10 companies experienced an identity-related security incident in the last year. SaaS sprawl and correlating identity sprawl are the popular bogeymen. With the typical…