#BeIdentitySmart Week aims to spotlight the importance of identity security as part of Cybersecurity Awareness Month. Each day during the week we will focus on a specific aspect of identity security, posting blogs from the IDSA and the identity and security community, as well as crowdsourced advice from our Identity Management Champions. We asked our champions, What is going…
Archives
-
Defining Identity Defined Security
The language of all things technical – science, medicine, technology – can be confusing. To make matters worse, in the technical world and more specifically cybersecurity we are famous for evolving or conflating terms that can often create confusion with our customers and the broader industry. The latest example is the evolution (and perhaps confusion)…
-
Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?
In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…
-
The Most Sensitive Cloud Configuration You’re Ignoring
Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…