Archives

  1. Identity Defined Security Alliance Publishes New Guidance on Zero Trust

    Alliance to share vision for changing security paradigm, and how putting identity at the center will help organizations leverage existing investments while reducing risk, at Black Hat USA 2019 DENVER, July 24, 2019 — The Identity Defined Security Alliance (IDSA), an industry alliance that helps organizations leverage existing cybersecurity investments to establish a stronger security posture, today…

  2. LogRhythm’s Journey to Identity-Centric Zero Trust

    The original Zero Trust model was developed by Forrester in 2010, but not fully embraced until Google successfully developed and implemented their version of Zero Trust, Beyond Corp, almost six years later. Let’s explore what exactly the Zero Trust model is and what it means to implement one. This shifts away from the large, corporate perimeters, with layered-in…

  3. Zero Trust in the Identity-Defined World

    The Origins of Zero Trust The Zero Trust model was established in 2010 by Forrester analyst John Kindervag and has enjoyed a fascinating and somewhat tumultuous 10-year history. It was born out of a period of increased and sustained breach activity combined with a growing frustration that existing security approaches were falling short of addressing…

  4. Customer Advisory Board Conversations: Adobe’s Den Jones on Integrations

    In this blog series, we’ll be providing the perspective of our Customer Advisory Board members on topics that are important to the identity and security vendor and practitioner community as we create frameworks and build products to help organizations successfully implement identity-centric security.  If you have topics or questions that you would like us to…

  5. Controlling Identity with the Endpoint

    The year is 2019 and if you’re like most of us, you’re seemingly gravitating closer and closer to all things ‘aaS’. Software, Identity, Infrastructure, Access Management, Integration – you name it and there’s a similar (if not superior) version of a core business service available in the cloud. While this shift has resulted in an…

  6. September 26th Webcast: The Case for Identity Centric Security – Adobe’s Path to ZEN

    Join us for our first ever live IDSA Webcast on September 26th, 2018 at 11:30am MT. Join Adobe’s Den Jones, Director of Enterprise Security, and Carlos Martinez, Sr. Systems Engineer, to hear how they overcame the struggle to find the balance between a pleasant user experience and stringent security requirements through a Zero-trust Enterprise Network…

  7. Optiv: Integrating IAM and Cyber Security Tools for a Zero Trust Approach

    Over the past few years traditional security techniques, like perimeter-based security, have not managed to prevent security breaches. Breaches continue to rise despite bigger and better network security devices. So what has caused some of these breaches? Specifically, employee negligence or loss, insider threats, hacking and data mobility across devices are all leading causes. However,…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.