Enterprises waste money on identity tools they don’t use

Misguided enterprise investment in multiple identity tools is proving insufficient in defending against today’s threat landscape, according to One Identity. 96% of companies report using multiple identity management tools, with 41% deploying at least 2… Continue reading Enterprises waste money on identity tools they don’t use

Overcoming unique cybersecurity challenges in schools

A school’s ecosystem is far different from that of the typical enterprise. Not only does a school district face the monumental task of educating our upcoming generations, but they must do it at the scale of a Fortune 500 enterprise with a fraction of t… Continue reading Overcoming unique cybersecurity challenges in schools

Moving your Microsoft environment to zero trust

Zero trust is a concept that’s easy to grasp but incredibly difficult to implement. It touches almost every system, component, application, and resource within an enterprise, and requires a strategic framework and specific tools and technologies to ach… Continue reading Moving your Microsoft environment to zero trust

65% of companies are considering adopting VPN alternatives

Despite high awareness of VPN risks, remote work forced many companies to rely more heavily on legacy access methods during the pandemic. At the same time, cybercriminals continue to take advantage of long-standing security vulnerabilities and increase… Continue reading 65% of companies are considering adopting VPN alternatives

Stolen credentials are the most common attack vector companies face

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), treading water (13%), or merely running to keep up (27%), according to a survey by S… Continue reading Stolen credentials are the most common attack vector companies face

Despite known security issues, VPN usage continues to thrive

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new survey conducted by Sapio Research. Furthermore, 97% say that adopting a zero… Continue reading Despite known security issues, VPN usage continues to thrive

Zero trust adoption: Industry-specific challenges and implementation strategies

Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience working directly with CISOs and CIOs at various organizations, the path toward… Continue reading Zero trust adoption: Industry-specific challenges and implementation strategies

Shadow IT is a top concern related to SaaS adoption

Torii announced a report revealing that 69% of tech executives believe shadow IT is a top concern related to SaaS – or cloud application – adoption. The majority of respondents have made exceptions to their SaaS security protocols, with 80% doing so be… Continue reading Shadow IT is a top concern related to SaaS adoption

4 steps for building an orchestrated authorization policy for zero trust

There is a great deal of emphasis placed on the zero-trust approach with respect to access. Looking beyond authentication (the act of verifying that someone is who they say they are), evaluating authorization is just as important as it determines what … Continue reading 4 steps for building an orchestrated authorization policy for zero trust

Cloud identity access and management market to reach $13.6 billion by 2026

Amid the COVID-19 crisis, the global market for cloud identity access and management (IAM) estimated at $5.3 billion in the year 2022, is projected to reach a revised size of $13.6 billion by 2026, growing at a CAGR of 26.7% over the analysis period, a… Continue reading Cloud identity access and management market to reach $13.6 billion by 2026