Tag Archives: Zero trust

  1. You Have a Standing Privilege Problem and Just Don’t Know It

    The year has just begun and as with previous years, many worrying strains of destructive malware have yet again been detected. Unlike ransomware, where you at least have a chance of recovering your data after paying the ransom, the new destructive techniques pose a very real and serious threat to businesses. The recently reported HermeticWiper…

  2. #BeIdentitySmart Week: Applying Identity to DevSecOps Tools and Processes

    We asked our champions for their best advice on Applying Identity to DevSecOps Tools and Processes. See below for their responses and we’d love to hear your perspective, too! Share your response on Twitter and join us in raising awareness of the importance of identity management and securing digital identities by sharing all of your best…

  3. Transforming Experience Through Customer Identity and Access Management (CIAM)

    Customers are the reason most businesses exist. Whether it’s healthcare, finance, retail, manufacturing, or entertainment, a business cannot succeed without customer interaction. It’s interesting to observe how this dynamic has changed over time. Today it is very clear that the customer is in control of this relationship, and much of the decision to continue the…

  4. To #BeCyberSmart, You Must #BeIdentitySmart

    Welcome to #BeIdentitySmart Week! As part of Cybersecurity Awareness Month and in conjunction with the National Cybersecurity Alliance, we’re excited to host a week of awareness to educate business leaders and IT decision makers on the importance of identity in cybersecurity strategies and business initiatives. In its 18th year, Cybersecurity Awareness Month, was created as a…

  5. Defining Identity Defined Security

    The language of all things technical – science, medicine, technology – can be confusing. To make matters worse, in the technical world and more specifically cybersecurity we are famous for evolving or conflating terms that can often create confusion with our customers and the broader industry. The latest example is the evolution (and perhaps confusion)…

  6. Eyes Without a Face, Got No Human Grace

    Why both Cybersecurity and IAM require Identity-centric Behavioral Analytics using modern Machine Learning approaches. “Eyes without a face…got no human grace…your eyes without a face…” The British punk-rocker Billy Idol said it all in his 1983 song about the most prominent problem today enterprise’s face when using cybersecurity technologies. They detect footprints, sometimes stretching to the…

  7. Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?

    In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…

  8. Managing Non-Human Identities for Vendor Access and Least Privilege Application Management

    While often overlooked, machine identities outnumber the human identities enterprises need to manage and protect. Their prevalence, coupled with the challenges of managing digital certificates and their sometimes, short-lived nature, creates potential gaps in visibility and control that skilled threat actors will eagerly look to exploit. Just like human identities, machine identities are at risk….

  9. NIST SP 800-207 – Zero Trust Architecture – Finalized with More Emphasis on Identity

    Last week, the National Institute of Standards and Technology (NIST) published its guidance for implementing a Zero Trust architecture, SP 800-207. This latest publication consolidates industry input received on previous draft versions of the architecture. As part of IDSA’s mission to promote identity-centric security, we provided feedback to NIST and are pleased to see some of our recommendations…

  10. New Technical Working Group Subcommittees Chartered to Expand Guidance for Identity and Security Professionals

    We’re excited to announce a significant expansion to our research and development efforts with the addition of 6 new Technical Working Group (TWG) subcommittees that encompass everything from the basics of best practices to innovations at the intersection of identity and security. Through our Technical Working Group, IDSA technology and solution provider members come together to…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.