Archives
-
Incorporating Machine Identities into an Identity-Centric Strategy
The importance of machine identities and non-person entities (or non-human identities) in the enterprise is often overlooked. Machine identities govern the confidentiality and integrity of information [flow] between machines. To ensure their unique identities, machines use keys and certificates, similar to people’s use of usernames and passwords (source Venafi). Automation is being used to drive…
-
The Path to Zero Trust Starts with Identity
Despite its origin almost 15 years ago, Zero Trust is more relevant today, than ever before. Your user communities have expanded, the amount of data being created is growing exponentially, and the traditional network perimeter has disappeared. It’s no longer feasible to protect your most sensitive assets behind a single network wall. Hackers are using…
-
LogRhythm’s Journey to Identity-Centric Zero Trust
LogRhythm’s CISO James Carder joined the organization recognizing he had an opportunity to improve the security of a security organization, but also architect and implement an architecture based on zero-trust that could be used as a model for organizations of similar size and IT characteristics. The path to Zero Trust is multi-phased, but once fully…
-
Adobe Finds ZEN Using Identity-Centric Security
As with most organizations that are implementing digital transformation initiatives, Adobe faced the struggle to find the balance between a pleasant user experience and stringent security requirements. With the increased complexity of user authentication, blending usernames and passwords with second factor authentication, the user experience can suffer. In many cases users needed to re-authenticate many…