Archives

  1. Defining Identity Defined Security

    The language of all things technical – science, medicine, technology – can be confusing. To make matters worse, in the technical world and more specifically cybersecurity we are famous for evolving or conflating terms that can often create confusion with our customers and the broader industry. The latest example is the evolution (and perhaps confusion)…

  2. IAM Stakeholders: The Business Operations Point of View

  3. Shifting your IAM Program from Compliance-Driven to Security-Driven

  4. Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?

    In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…

  5. How a ‘Zero-Trust’ Approach Enables Healthcare Organizations to Improve Security

  6. Pandemic Put Identity Security in the Spotlight, CISO Opportunity Awaits

    In May of 2020 we published our first research specific to identity-related breaches, Identity Security: A Work in Progress, in which we found that 94% of organizations had suffered an identity-related breach and 79% just in the last 2 years. In short, identity-related breaches were ubiquitous. Some organizations however, those with an identity-forward culture, had suffered…

  7. The Most Sensitive Cloud Configuration You’re Ignoring

    Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…

  8. Authentication Requirements for the Presidential Executive Order

  9. Identity management is now mostly about security

  10. IDSA Releases 2021 Trends in Securing Digital Identities

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.