Posts by Vaughn Camarda

  1. Preventing the Latest Trend in Identity-Related Attacks

    Next time you sit down to enjoy your morning coffee at your desk, challenge yourself to count how many authentication requests you receive from various apps, devices, and systems throughout the working day. Enterprises’ solution to the rising threat of identity-related attacks has been implementing multi-factor authentication (MFA) to protect users. However, savvy attackers have…

  2. Why Identity is the First Line of Cybersecurity Defense

    Identity has rapidly evolved to become organizations’ first line of defense against increasingly sophisticated cybersecurity threats. This evolution has made identity a business enabler and a critical board-level topic. Identity and Access Management (IAM) programs tend to lurk in the shadows until something goes wrong. But enterprises now have capabilities that haven’t yet been applied…

  3. Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP)

    For today’s enterprises, security must adapt to the dynamic needs of the environments and the users. That takes integration and the ability to use everything from device characteristics to user behavior to make decisions about access and authentication. However, this integration and interoperability can be hard to come by. As organizations look to Zero Trust…

  4. Identity Security and Artificial Intelligence: Certification of Access

    In a blog published in October of 2021, Identity Security and Artificial Intelligence, the AI/ML Technical Working Group subcommittee outlined a blog series that explores how the application of artificial intelligence (AI) and machine learning (ML) can help solve some of the complexities of modern Identity security practices as well as the challenges involved.  In…

  5. The Identity Threat Detection and Response Lifecycle

    Identity pros have long understood that identity is the new security perimeter. Identity systems like Active Directory (AD)—the primary identity store in use today—are primary targets for cyberattacks. By gaining access to AD, attackers can eventually grab the types of elevated privileges necessary to steal company and user data and intellectual property and to lock…

  6. Managing Access as You Manage Identity

    Identity management and access management are close cousins in the cyber family, but despite their similarities, they have very different roles to play in protecting data. While access management focuses on the role of the gatekeeper, identity management focuses on managing key information that the gatekeeper needs to make decisions. This information—the attributes related to…

  7. Why You Must Protect Your Digital Identity at All Costs

    Identities are under attack from all sides. The risk surface is increasing exponentially, and threat actors are endlessly inventing more sophisticated and nefarious means for identity-based attacks. At the same time, digital identities are becoming more complex. Each identity can—and does—have multiple accounts, credentials, entitlements, rights, and privileges. While some accounts may be more secure…

  8. Connecting the Dots Between Cybersecurity and Managing Identity

    The use of video doorbells and internal and external video cameras for home security has skyrocketed in recent years as homeowners seek new ways to protect themselves and their property. While these devices may capture images of potential intruders, they cannot confirm their identities. Is this really an employee from your electric company or is…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.