The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…
Archives
-
NIST Cybersecurity Framework 2.0 And Why It Matters
August 7th, 2024 by Vaughn Camarda | Posted in Uncategorized |
The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…
-
BeIdentitySmart, BeCyberSmart For Security Leaders
March 1st, 2023 by Jeff Reich | Posted in How To Advice |
Being a security leader in the modern digital world is more challenging than ever. Businesses face a never-ending barrage of increasingly sophisticated cyber-attacks across their expanding attack surfaces. And security leaders that aren’t taking action to protect their companies and employees will continue to suffer significant losses. The consequences of suffering a breach are becoming…
-
Can We Prevent Identity-Related Cyberattacks?
February 16th, 2023 by Vaughn Camarda | Posted in How To Advice |
With sophisticated cyber criminals coming up with new attack methods every day, it’s a fair question to ask whether we can really prevent identity-related breaches. As cyberattackers have continued to pummel organizations’ identity systems during the last few years, the calls for stronger identity system defense have become more urgent—and not a moment too soon….
-
Preventing the Latest Trend in Identity-Related Attacks
January 10th, 2023 by Vaughn Camarda | Posted in How To Advice |
Next time you sit down to enjoy your morning coffee at your desk, challenge yourself to count how many authentication requests you receive from various apps, devices, and systems throughout the working day. Enterprises’ solution to the rising threat of identity-related attacks has been implementing multi-factor authentication (MFA) to protect users. However, savvy attackers have…
Recent Comments
No comments to show.