Tag Archives: CASB

  1. The Most Sensitive Cloud Configuration You’re Ignoring

    Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…

  2. Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case

    There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…

  3. Zero Trust Myth Series: Leveraging Risk Analysis to Enhance Trust

    Trust is a foundational part of personal relationships, and it is a foundational part of the digital relationships between employees, their devices, and the enterprise. However, the sad fact facing security professionals is that there are some insiders – whether they are disgruntled employees or external threat actors acting as legit users that penetrated the…

  4. Zero Trust Myth Series: Zero Trust is about Secure Access, Not Zero Access

    Say the term Zero Trust, and there will be those that take the word zero to mean exactly that-zero, as in no trust at all. In reality, Zero Trust is about acknowledging that bad actors will make their way into an organization’s environment and building defenses with that idea in mind. This confusion is the…

  5. Zero Trust Myth Series: Going Beyond the Network

    First impressions die hard. When the concept of Zero Trust was first introduced, the focus was on segmenting, isolating, and controlling network traffic. Today, however, those ideas represent only one fraction of a Zero Trust strategy. On my list of Zero Trust myths, the second fallacy I noted was the idea that Zero Trust focuses solely on…

  6. Optiv: Integrating IAM and Cyber Security Tools for a Zero Trust Approach

    Over the past few years traditional security techniques, like perimeter-based security, have not managed to prevent security breaches. Breaches continue to rise despite bigger and better network security devices. So what has caused some of these breaches? Specifically, employee negligence or loss, insider threats, hacking and data mobility across devices are all leading causes. However,…

  7. Thanks for Joining Us at Identiverse!

    What a great week in Boston at Identiverse! There were so many keynotes, sessions and master classes where identity and security were mentioned in the same sentence. It has not always been the case, and it is our mission to help make the bridge between identity and security seamless for customers looking to implement a…

  8. Join IDSA at Identiverse!

    We’re excited to sponsor Identiverse this year! If you’re not familiar, Identiverse, formerly known as the Cloud Identity Summit, is where the identity community gathers for all things identity (and now security!) – keynotes, breakout sessions, workshops and master classes. There are family activities and some networking and socializing, too. It’s where you can “get…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.