Posts by Vaughn Camarda

  1. Top Cybersecurity Trend Predictions for 2024: BeyondTrust Edition

  2. Cyber Security Awareness Tips – Remote Edition

    As we observe the 20th anniversary of of Cybersecurity Awareness Month, I thought it was time for us to revisit some common good practices for remote computing. Please make use of the IDSA resources and consider joining to unlock access for even more! About the Author: Jeff Reich, CISSP, CRISC, ITIL – Executive Director of…

  3. SailPoint: How identity security can be a business accelerator.

    This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…

  4. Compliance Strategies for Blockchain-Based Identity Management Solutions

    Introduction A blockchain is a virtually distributed system consisting of a series of time-stamped, immutable data records with each “block” of information stored across a wide range of computer networks. It is increasingly being utilized in various information security spaces including identity management. Identity management refers to all the processes and technologies an organization uses…

  5. Cerby: The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications

  6. Will Passwords Become a Thing of the Past?

    Even though we are big believers in strong, unique passwords, we even get headaches about generating, maintaining, and safely storing hundreds of passwords. They are somehow too easily cracked by today’s cybercriminals but impossible for us to remember at the same time. Now many people are dreaming of a more secure future, a future where…

  7. BeIdentitySmart, BeCyberSmart for Security Practitioners

    The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…

  8. Identity Management Day and the Importance of Strong Identity Security

    The scope of identity and access management (IAM) has expanded over the years. In the beginning, IAM concerned only identities that represented humans, but more recently it has grown to encompass not only tools and technologies, but processes through which a digital identity is defined and managed to provide access to digital resources. IAM has…

  9. Can We Prevent Identity-Related Cyberattacks?

    With sophisticated cyber criminals coming up with new attack methods every day, it’s a fair question to ask whether we can really prevent identity-related breaches. As cyberattackers have continued to pummel organizations’ identity systems during the last few years, the calls for stronger identity system defense have become more urgent—and not a moment too soon….

  10. Preventing the Latest Trend in Identity-Related Attacks

    Next time you sit down to enjoy your morning coffee at your desk, challenge yourself to count how many authentication requests you receive from various apps, devices, and systems throughout the working day. Enterprises’ solution to the rising threat of identity-related attacks has been implementing multi-factor authentication (MFA) to protect users. However, savvy attackers have…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.