Archives

  1. 5 Things I learned delivering Zero Trust at Adobe and Cisco

    This blog was originally published by 909Cyber here.   Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In my role of running enterprise Security for both companies (of course not at the same time). As the executive leading…

  2. Mastering Financial Services Compliance With IAM and PAM

    This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…

  3. The Impact of Security Breaches on Educational Institutions

    This blog was originally published by Bravura here.   Educational institutions oversee hundreds or thousands of students and faculty members daily. Therefore, it’s no surprise they deal with large volumes of valuable data, like: Student and educator login information. Home addresses. Birthdays. Full names. Social security numbers. Credit card information and other financial records. Education…

  4. 4 Mindset Shifts for Making Zero Trust Work in the Real World

    This blog was originally published by Cerby here. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice, it’s often reduced to a check-the-box product deployment or a single vendor’s promise to “solve” it for you.  But Zero Trust is not something you…

  5. The Zero Trust Security Model Companies Need Now

    In the last two years, 79% of organizations have experienced an identity-related security breach, according to research from the Identity Defined Security Alliance (IDSA). That’s a truly staggering number, however, the even more shocking statistic is that nearly all of the security and identity professionals surveyed believe their identity-related breaches were preventable if they were…

  6. Zero Trust in Practice: What’s Working, What’s Failing & What’s Next

  7. Identity and Access Management in the AI Era: 2025 Guide

    The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…

  8. Disconnected Apps: The Gap in Your Zero Trust Strategy

    Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless disconnected apps lurk in the background, posing significant risks to your organization. What Are disconnected…

  9. Building Zero Trust Security Posture for Secure Privileged Access Management Journey

    This blog was originally posted by Arcon on their blog page. You can read the original here. Overview Today, we are experiencing a growing assortment of applications, systems, APIs, and data that is scattered across IT networks in distributed IT infrastructure and multi-cloud environments. This assortment of critical information is constantly at risk from unauthorized…

  10. How Modern IGA Supports the Zero Trust Security Model

    By now, everyone is familiar with the Zero-Trust security model.  The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.