Archives

  1. Cyber Security Awareness Tips – Remote Edition

    As we observe the 20th anniversary of of Cybersecurity Awareness Month, I thought it was time for us to revisit some common good practices for remote computing. Please make use of the IDSA resources and consider joining to unlock access for even more! About the Author: Jeff Reich, CISSP, CRISC, ITIL – Executive Director of…

  2. Zero Trust Initiatives For Identity-First Cyber Resiliency

  3. Securing Your Remote Workforce Through Identity-Centric Security

    For countless U.S. workers, the corporate office has moved from a multi-story building downtown to a four-walled room in their home. With the traditional network perimeter almost fully eroded, empowering employees to work remotely requires rethinking security, and many organizations have shifted toward a Zero Trust approach that puts identity at its center. By prioritizing…

  4. 2020: A Year Like No Other

    As we approach the end of 2020 (finally!) and reflect on the last 364 days, I think it is safe to say that everyone shares this same perspective – it was truly a year like no other. And while most every aspect of our personal lives was turned upside down; this year also represented a…

  5. Tighter identity and asset management is essential to WFH security

  6. The Implications of Bring Your Own Identity

    When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to…

  7. Privileged Access Management Starts with Endpoint Privilege

    Investigate any data breach impacting today’s enterprises, and you will likely find evidence of credential theft and lateral movement by attackers. Stopping threat actors from gaining persistence and deepening their compromise once they have gotten through the digital door remains part of the daily routine of security professionals. In a traditional work environment, an employee…

  8. Identity-Centric Security Empowers Businesses

    Between the explosive growth of enterprise mobility and the increased adoption of cloud services, the number of workforce identities has skyrocketed. Accompanying that increase is a sobering statistic: according to a recent survey by the Identity Defined Security Alliance (IDSA), 79% of security and identity professionals say their company has experienced an identity-related breach in…

  9. BYO[D] Doesn’t Have to Mean Bring Your Own [Vulnerability]

    The Bring-Your-Own-Device (BYOD) model of operating has been a double-edged sword for IT professionals. On the one hand, it empowers and allows for business productivity. On the other hand, it continues to create a serious challenge for organizations as IT and security professionals find ways to enforce access control across a diverse ecosystem of mobile…

  10. Customer Advisory Board Conversations: Zero Trust and the Remote Workforce

    Until the last 45 days, an organization’s industry, company culture and the role of an individual were the primary drivers behind remote working policies. However, recently we’ve seen an unprecedented shift to remote working due to the concerns over Covid-19. For some organizations it’s been relatively uneventful, for others it has been a monumental change…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.