This blog was originally published by Bravura Security here. In an era where 80% of data breaches involve compromised credentials and privilege escalation, traditional identity and access management (IAM) and privileged access management solutions (PAM) solutions are falling behind. While organizations have invested millions in layered implementations rooted in traditional enterprise approaches, these solutions…
Archives
-
2025’s Identity Security Storm: AI, IoT and Emerging Threats
August 20th, 2025 by Paul Hunter | Posted in Best Practices, News, Perspective, Research, Security Outcomes |
Tags: AI Identity Security, AI Threats, digital identity, Emerging Tech, IAM, IoT Security, Machine Learning Security, PAM
This blog was originally published by Bravura Security here. A stark reality faces modern enterprises: 94% of cyber attacks now specifically target identity systems, not traditional network defenses. As threats rapidly evolve, organizations struggling with fragmented identity and access management (IAM), privileged and access management (PAM), and password management architectures face increasing risk from sophisticated…
-
How to Prevent $4M Breaches with Unified IAM and PAM Defense
August 5th, 2025 by Paul Hunter | Posted in Best Practices, How To Advice, Perspective |
Tags: IAM, PAM, privileged access management
The identity security landscape has reached a critical tipping point. As AI-powered attack tools become readily available, attackers target identity credentials and privileged access with unprecedented sophistication and scale. Traditional fragmented security approaches are crumbling under the weight of automated threats that can simultaneously exploit both identity and privilege vulnerabilities. According to EMA Research, the…
-
5 Things I learned delivering Zero Trust at Adobe and Cisco
July 3rd, 2025 by Paul Hunter | Posted in Perspective |
This blog was originally published by 909Cyber here. Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…
-
If Identity is the New Perimeter, Then We Need a Compliance Standard
June 19th, 2025 by Vaughn Camarda | Posted in Best Practices, Security Outcomes |
In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…
-
The Impact of Security Breaches on Educational Institutions
June 11th, 2025 by Paul Hunter | Posted in Best Practices, Perspective |
Tags: access management, cybersecurity, higher education, identity management, privileged access management
This blog was originally published by Bravura here. Educational institutions oversee hundreds or thousands of students and faculty members daily. Therefore, it’s no surprise they deal with large volumes of valuable data, like: Student and educator login information. Home addresses. Birthdays. Full names. Social security numbers. Credit card information and other financial records. Education…
-
The Zero Trust Security Model Companies Need Now
June 4th, 2025 by Paul Hunter | Posted in Best Practices, Perspective |
In the last two years, 79% of organizations have experienced an identity-related security breach, according to research from the Identity Defined Security Alliance (IDSA). That’s a truly staggering number, however, the even more shocking statistic is that nearly all of the security and identity professionals surveyed believe their identity-related breaches were preventable if they were…
-
Identity and Access Management in the AI Era: 2025 Guide
April 29th, 2025 by Vaughn Camarda | Posted in Best Practices, Perspective |
The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…
-
NIST Cybersecurity Framework 2.0 And Why It Matters
August 7th, 2024 by Vaughn Camarda | Posted in Uncategorized |
The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…
-
BeIdentitySmart, BeCyberSmart For Security Leaders
March 1st, 2023 by Jeff Reich | Posted in How To Advice |
Being a security leader in the modern digital world is more challenging than ever. Businesses face a never-ending barrage of increasingly sophisticated cyber-attacks across their expanding attack surfaces. And security leaders that aren’t taking action to protect their companies and employees will continue to suffer significant losses. The consequences of suffering a breach are becoming…
Recent Posts
- Do Your CI/CD Pipelines Need Identities? Yes.
- How Convergent Identity-Based Security Reduces Risk, Increases Efficiency
- 2025’s Identity Security Storm: AI, IoT and Emerging Threats
- Non-Human Identities: The unseen workforce driving AI-era security
- Why You Should Say Goodbye to Manual Identity Processes
Recent Comments
No comments to show.