In the classroom, universities and colleges are looking towards the future with their curricula, stretching young minds around evolving concepts and advancements. The irony? Behind the scenes, these same institutions are often unprepared for the changes that developing technology brings to their campuses and networks. Recent digital disruptions, such as AI, have exposed the systems…
Tag Archives: Access Control
-
Identity and Access Management and Identity Governance Explained
October 22nd, 2025 by Paul Hunter | Posted in Best Practices, Perspective, Security Outcomes |
Tags: Access Control, access governance, Audit Ready, IAM and IGA, IAM Modernization, identity and access management, Identity Automation, identity governance, Least Privilege, Security Compliance
Mitigating identity-related access risks is critical as organizations face evolving threats daily. As businesses shift to multi-cloud and hybrid environments, identity sprawl such as shadow IT and unmanaged SaaS apps has become a top attack vector. Identity and access management (IAM) and identity governance and administration (IGA) must now secure identities beyond corporate perimeters, spanning AWS, Azure, Google Cloud, and SaaS platforms…
-
Break Glass Accounts – Risk or Required
October 1st, 2025 by Paul Hunter | Posted in Best Practices, Perspective, Research |
Tags: Access Control, break glass accounts, Cyber Risk, cybersecurity, Data Protection, IAM, identity management, Incident Response, IT Security, MFA, Privileged Access, Resilience, Risk Management, Security Best Practices, Zero trust
We have all seen the sign, “In case of fire, break glass, and pull alarm.” While this necessary mitigating control for fire safety is explicitly known and present in almost every building, an analogy translates into the cybersecurity landscape as “break glass accounts.” In fact, few risk-mitigating controls stir as much debate among CISOs as…
Recent Comments
No comments to show.