In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of sensitive information. In order to detect these software flaws, vendors like eEye, ISS, and Nessus began creating vulnerability scanners to identify operating systems and software…
Posts by Vaughn Camarda
-
How to Get More Value From Your IAM and IGA Investments
Every year, the world’s organizations collectively spend tens of billions of dollars on Identity and Access Management (IAM) and Identity Governance and Administration (IGA) solutions. Yet, while there are many capable IAM and IGA products available, extending their reach to cover all the apps used by an organization — to deliver the desired outcomes and…
-
5 Identity Security Challenges in the Finance Industry
Cybersecurity threats are prevalent in the financial sector. In 2024, finance and insurance was the second-most vulnerable industry to cyberattacks. This sector was involved in about 19% of global attacks, preceded by manufacturing at nearly 25%. Banks and other financial organizations manage and store large amounts of client and monetary data. Naturally, this makes them…
-
Six Identity Governance Trends to Follow in 2025
Omada surveyed 502 IT and business leaders responsible for identity governance, access management, compliance, cybersecurity, and general IT administration to uncover the latest trends in identity governance across large organizations. The full results appear in The State of Identity Governance 2025. If you’re looking to strengthen your Identity Governance and Administration (IGA) strategy for 2025…
-
How Modern IGA Supports the Zero Trust Security Model
By now, everyone is familiar with the Zero-Trust security model. The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…
-
Four Critical Findings from the State of Identity Governance
Omada’s research report State of Identity Governance 2024 queried 551 IT professionals about how their organizations manage identity-related cybersecurity threats, the tools they use and where they deploy them, and what functionality they look for when evaluating an identity governance and administration (IGA) solution. The research uncovered specific deficiencies typical in current IGA practices and…
-
Why Healthy IGA Is Essential for Effective Cybersecurity
Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an organization not having sufficient control over access and permissions. Even organizations that can show compliance with industry-specific standards and regulations frequently do not have enough insight…
-
Building Resilient and Secure Networks for Government Agencies at the Zero Trust Government Symposium
Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a hybrid workforce, defining adoption milestones, defeating adversaries, and addressing challenges in Zero Trust strategy. Attendees at the 2024 Symposium on July 17-18 in National Harbor, MD will have the unique…