Archives

  1. How Convergent Identity-Based Security Reduces Risk, Increases Efficiency

    This blog was originally published by Bravura Security here.   In an era where 80% of data breaches involve compromised credentials and privilege escalation, traditional identity and access management (IAM) and privileged access management solutions (PAM) solutions are falling behind. While organizations have invested millions in layered implementations rooted in traditional enterprise approaches, these solutions…

  2. 2025’s Identity Security Storm: AI, IoT and Emerging Threats

    This blog was originally published by Bravura Security here. A stark reality faces modern enterprises: 94% of cyber attacks now specifically target identity systems, not traditional network defenses. As threats rapidly evolve, organizations struggling with fragmented identity and access management (IAM), privileged and access management (PAM), and password management architectures face increasing risk from sophisticated…

  3. Zero Trust Falls Short Without Network Identity: Lessons from Salt Typhoon

  4. Non-Human Identities: The unseen workforce driving AI-era security

    This blog was originally published by iDMig here. Non-human identities (NHIs) are front and center Throughout the conferences I’ve attended, and those I had the privilege to present in 2024 and 2025, one key takeaway from all is the explosive growth of non-human identities. These identities have been around for decades to be sure, primarily…

  5. Compliance and Unified Identity Security in Financial Services

    With all the sensitive data financial institutions collect, it should come as no surprise that the financial services industry is one of the top targets for cybercriminals. That’s also why compliance with stringent regulations and standards is so important — in fact, it’s essential for doing business. In the interconnected financial landscape, managing multiple point solutions for compliance…

  6. What’s Your Security Strategy?

  7. 5 Things I learned delivering Zero Trust at Adobe and Cisco

    This blog was originally published by 909Cyber here.   Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…

  8. Mastering Financial Services Compliance With IAM and PAM

    This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…

  9. The Impact of Security Breaches on Educational Institutions

    This blog was originally published by Bravura here.   Educational institutions oversee hundreds or thousands of students and faculty members daily. Therefore, it’s no surprise they deal with large volumes of valuable data, like: Student and educator login information. Home addresses. Birthdays. Full names. Social security numbers. Credit card information and other financial records. Education…

  10. 4 Mindset Shifts for Making Zero Trust Work in the Real World

    This blog was originally published by Cerby here. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice, it’s often reduced to a check-the-box product deployment or a single vendor’s promise to “solve” it for you.  But Zero Trust is not something you…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.