Archives

  1. Identity Management Day: What Sharks and Your Identity Program Have in Common

    Legend has it that in 1988 the idea for Shark Week was hatched over a round of drinks and documented on the back of a napkin as an awesome (and fun) way to capture more viewers. Seems like it worked: Discovery Channel viewers doubled after the very first Shark Week. Fast forward to 2021, and…

  2. Managing Non-Human Identities for Vendor Access and Least Privilege Application Management

    While often overlooked, machine identities outnumber the human identities enterprises need to manage and protect. Their prevalence, coupled with the challenges of managing digital certificates and their sometimes, short-lived nature, creates potential gaps in visibility and control that skilled threat actors will eagerly look to exploit. Just like human identities, machine identities are at risk….

  3. The Unique Challenges of Customer Identity and Access Management

    As the world faced quarantines, stay at home orders and shuttered businesses, even normally reluctant consumers were forced to go online to grocery shop, order take-out and stay connected to friends and family. This focus on transacting daily tasks on-line placed a major spotlight on an emerging subset of identity security, customer identity and access…

  4. Identity-Centric Security: 10 Data Points from 10 Different Vendors (and a book) Make the Case

    There’s almost universal consensus that perimeter-centric security is insufficient for today’s distributed IT environments. But where debate amongst IT pros and vendors now rages is whether the optimal enterprise security approach today is application-centric, data-centric, or identity-centric. Data-centric and application-centric approaches have merit, but each can be undermined simply by the wrong identity accessing data,…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.