Archives

  1. Zero Trust Myth Series: Keep Users at the Forefront of Your Security Approach

    Friction is the enemy of cybersecurity. Tools and approaches that make it more difficult for users to do their jobs turn security solutions into impediments, digital stop signs in an era when business leaders are demanding agility. For organizations implementing a Zero Trust approach, the subject of user experience should not be far from mind….

  2. Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case

    There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…

  3. Zero Trust Myth Series: Zero Trust is about Secure Access, Not Zero Access

    Say the term Zero Trust, and there will be those that take the word zero to mean exactly that-zero, as in no trust at all. In reality, Zero Trust is about acknowledging that bad actors will make their way into an organization’s environment and building defenses with that idea in mind. This confusion is the…

  4. Guest Blog: A Community Vision, A Team Game Approach and a Call to Action for Tomorrow’s CISOs

    We recently sat down with Adam Bosnian, Identity Defined Security Alliance (IDSA) executive advisory board member and EVP of global business development at CyberArk, to discuss the importance of collaborative, identity-centric security and the evolving role of the CISO in the digital transformation age. Here’s a summary of what he had to say: Can you describe how…

  5. The State of Identity: With Explosive Identity Growth, Organizational Disconnects Creating Security Risk

    The Identity Defined Security Alliance (IDSA) has developed its vision and mission based on several challenges faced by IT organizations – Compromised identities are the leading cause of breaches. There is an over-abundance of complex security technologies and confusion over where to start. Effective security strategies require the use of multiple solutions that must integrate…

  6. Healthcare CISOs Push the Importance of Identity

    Last week H-ISAC, a trusted community of critical infrastructure owners and operators within the Health Care and Public Health sector (HPH), published a new paper titled “Identity for the CISO Not Yet Paying Attention to Identity.”  The paper, authored by a technical working group of healthcare CISOs, is the first in a series focused on…

  7. Zero Trust in the Identity-Defined World

    The Origins of Zero Trust The Zero Trust model was established in 2010 by Forrester analyst John Kindervag and has enjoyed a fascinating and somewhat tumultuous 10-year history. It was born out of a period of increased and sustained breach activity combined with a growing frustration that existing security approaches were falling short of addressing…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.