Archives

  1. You Have a Standing Privilege Problem and Just Don’t Know It

    The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…

  2. Identity – Don’t Forget About the Device

    The word “identity” has always made us think of a person’s identity. However, over the past 20 years the meaning of the term has evolved subtly. This evolution focused mainly on the shift from a human identity to privileged identities and then to generic accounts and application-based accounts. But the last five years or so…

  3. Unified Identity Protection – Turning Zero Trust to Reality

  4. Considering a Move to Zero Trust Security? Keep these Identity Security Practices and Resources in Mind

  5. Put Identity First in 2022: 7 Must Reads from 2021

    At this time last year, I described 2020 as “a year like no other,” and as we always do at this time of year, we looked forward to 2021 with high hopes and big plans for a return to normalcy. But as we wrap up 2021 and our third year dedicated to helping security leaders…

  6. Going back to Zero: A Primer on Zero Trust

    We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…

  7. Making Sense of Zero Trust: Perspectives from Inside and Outside Government Organizations

  8. Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?

    In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…

  9. How a ‘Zero-Trust’ Approach Enables Healthcare Organizations to Improve Security

  10. Authentication Requirements for the Presidential Executive Order

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.