Archives

  1. 2020: A Year Like No Other

    As we approach the end of 2020 (finally!) and reflect on the last 364 days, I think it is safe to say that everyone shares this same perspective – it was truly a year like no other. And while most every aspect of our personal lives was turned upside down; this year also represented a…

  2. An Identity-Centric Approach to Harden a COVID-19 Critical Business

  3. The Implications of Bring Your Own Identity

    When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to…

  4. Mission Possible: Better Identity Through Public/Private Sector Collaboration

    One of the most entertaining parts of the Mission Impossible movies is watching the characters don masks of targets they want to impersonate and slip into and out of the secret identities like gloves. In the digital world, impersonating people is much simpler. Thankfully, government officials and the consumers they represent appear to want to change that. In…

  5. Identity-Centric Security Empowers Businesses

    Between the explosive growth of enterprise mobility and the increased adoption of cloud services, the number of workforce identities has skyrocketed. Accompanying that increase is a sobering statistic: according to a recent survey by the Identity Defined Security Alliance (IDSA), 79% of security and identity professionals say their company has experienced an identity-related breach in…

  6. NIST SP 800-207 – Zero Trust Architecture – Finalized with More Emphasis on Identity

    Last week, the National Institute of Standards and Technology (NIST) published its guidance for implementing a Zero Trust architecture, SP 800-207. This latest publication consolidates industry input received on previous draft versions of the architecture. As part of IDSA’s mission to promote identity-centric security, we provided feedback to NIST and are pleased to see some of our recommendations…

  7. Mitigating the Risk of Social Engineering

    Peel back the layers of most enterprise data breaches, and credential theft will be at the center. For an attacker, user credentials are worth their weight in gold, and getting them means exploiting the weakest link in the chain of cybersecurity: people. Even in 2020, social engineering remains arguably the most reliable tool in an…

  8. Adapting the IDSA Framework to Keep Pace with Evolution of Identity and Security Industry

    Today we are excited to announce the latest adaptation of the Identity Defined Security Framework, which offers practical, vendor-neutral guidance on how to achieve identity-centric security. The update is the culmination of numerous whiteboards, conference calls, and a two-day Technical Working Group workshop in San Francisco, where over 15 IDSA member companies came together to discuss…

  9. Research Shows How Forward Thinking Enterprises are Preventing Breaches

    Last fall we published our first research, the results of a survey of 511 security leaders, to get their perspective on identity, including importance and organizational challenges that might create added risk. We found explosive growth of identities in the last five years (half of the companies experienced five-fold growth in the past 10 years) and…

  10. The Language of Identity: Bringing Everyone Together

    Everyone in computer science understands the importance of standardized programming languages, and yet, in conversations between security practitioners and IT infrastructure managers about identity, much seems to get lost in translation. Terms like authorization and authentication are often used interchangeably, but also have distinct meanings to different people. Say authentication to a security person, and…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.