Posts by Vaughn Camarda

  1. If Identity is the New Perimeter, Then We Need a Compliance Standard

    In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…

  2. How to Get More Value From Your IAM and IGA Investments

    Every year, the world’s organizations collectively spend tens of billions of dollars on Identity and Access Management (IAM) and Identity Governance and Administration (IGA) solutions. Yet, while there are many capable IAM and IGA products available, extending their reach to cover all the apps used by an organization — to deliver the desired outcomes and…

  3. 5 Identity Security Challenges in the Finance Industry

    Cybersecurity threats are prevalent in the financial sector. In 2024, finance and insurance was the second-most vulnerable industry to cyberattacks. This sector was involved in about 19% of global attacks, preceded by manufacturing at nearly 25%. Banks and other financial organizations manage and store large amounts of client and monetary data. Naturally, this makes them…

  4. Identity and Access Management in the AI Era: 2025 Guide

    The enterprise technology landscape is experiencing a remarkable transformation that will fundamentally change how organizations approach identity and access management. AI industry leaders such as Sam Altman of OpenAI, and Jensen Huang of NVIDIA, have predicted that by 2025, AI agents will become integral members of the corporate workforce. For IAM leaders, this transformation represents…

  5. Six Identity Governance Trends to Follow in 2025

    Omada surveyed 502 IT and business leaders responsible for identity governance, access management, compliance, cybersecurity, and general IT administration to uncover the latest trends in identity governance across large organizations. The full results appear in The State of Identity Governance 2025. If you’re looking to strengthen your Identity Governance and Administration (IGA) strategy for 2025…

  6. How Modern IGA Supports the Zero Trust Security Model

    By now, everyone is familiar with the Zero-Trust security model.  The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…

  7. Four Critical Findings from the State of Identity Governance

    Omada’s research report State of Identity Governance 2024 queried 551 IT professionals about how their organizations manage identity-related cybersecurity threats, the tools they use and where they deploy them, and what functionality they look for when evaluating an identity governance and administration (IGA) solution. The research uncovered specific deficiencies typical in current IGA practices and…

  8. NIST Cybersecurity Framework 2.0 And Why It Matters

    The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…

  9. Why Healthy IGA Is Essential for Effective Cybersecurity

    Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an organization not having sufficient control over access and permissions. Even organizations that can show compliance with industry-specific standards and regulations frequently do not have enough insight…

  10. Building Resilient and Secure Networks for Government Agencies at the Zero Trust Government Symposium

    Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a hybrid workforce, defining adoption milestones, defeating adversaries, and addressing challenges in Zero Trust strategy. Attendees at the 2024 Symposium on July 17-18 in National Harbor, MD will have the unique…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.