The rapid evolution of AI, particularly with powerful platforms like Azure AI Studio and Azure OpenAI, presents an exciting frontier for innovation. However, as I’ve explored in previous posts on Google Vertex and AWS Bedrock, this new landscape also introduces a complex web of identity and access management (IAM) challenges that security and identity teams…
Posts by Vaughn Camarda
-
Identity Defined Security Alliance Announces Machine and Agent Identity Working Group
December 17, 2025: The Identity Defined Security Alliance is thrilled to announce the official launch of its Machine and Agent Identity Working Group. The initiative unites leading experts to tackle the challenges of securing machine and AI agent (non-human) identities in today’s digital era. With machine identities already outnumbering humans 82:1 and over 50% of…
-
Compliance and Unified Identity Security in Financial Services
With all the sensitive data financial institutions collect, it should come as no surprise that the financial services industry is one of the top targets for cybercriminals. That’s also why compliance with stringent regulations and standards is so important — in fact, it’s essential for doing business. In the interconnected financial landscape, managing multiple point solutions for compliance…
-
How to Get More Value From Your IAM and IGA Investments
Every year, the world’s organizations collectively spend tens of billions of dollars on Identity and Access Management (IAM) and Identity Governance and Administration (IGA) solutions. Yet, while there are many capable IAM and IGA products available, extending their reach to cover all the apps used by an organization — to deliver the desired outcomes and…
-
5 Identity Security Challenges in the Finance Industry
Cybersecurity threats are prevalent in the financial sector. In 2024, finance and insurance was the second-most vulnerable industry to cyberattacks. This sector was involved in about 19% of global attacks, preceded by manufacturing at nearly 25%. Banks and other financial organizations manage and store large amounts of client and monetary data. Naturally, this makes them…
-
Six Identity Governance Trends to Follow in 2025
Omada surveyed 502 IT and business leaders responsible for identity governance, access management, compliance, cybersecurity, and general IT administration to uncover the latest trends in identity governance across large organizations. The full results appear in The State of Identity Governance 2025. If you’re looking to strengthen your Identity Governance and Administration (IGA) strategy for 2025…
-
How Modern IGA Supports the Zero Trust Security Model
By now, everyone is familiar with the Zero-Trust security model. The main concept behind Zero-Trust is “never trust, always verify.” This means that users and devices should not be trusted by default, even if they are connected to a permissioned network or previously verified. The principle of least privilege within a modern identity governance solution…
-
Four Critical Findings from the State of Identity Governance
Omada’s research report State of Identity Governance 2024 queried 551 IT professionals about how their organizations manage identity-related cybersecurity threats, the tools they use and where they deploy them, and what functionality they look for when evaluating an identity governance and administration (IGA) solution. The research uncovered specific deficiencies typical in current IGA practices and…