New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

This CISA-NSA guidance reveals concerning gaps and deficits in the multifactor authentication and Single Sign-On industry and calls for vendors to make investments and take additional steps. Continue reading New CISA and NSA Identity and Access Management Guidance Puts Vendors on Notice

Pushing the Limits of IDaaS with AMaaS

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, to authenticate thei… Continue reading Pushing the Limits of IDaaS with AMaaS

Zero-Trust is an Adjective Without a Noun

People love to talk about zero-trust right now, for a number of reasons. It has the word “zero” in there, which has some history in the information security world (e.g., zero-day vulnerabilities). It’s also a simple and eye-catching phrase, so it fits… Continue reading Zero-Trust is an Adjective Without a Noun

The False Identity Frenzy and the Need for Authentication

Emil Sayegh, president and CEO of Ntirety, unpacks the issue of inauthentic identities opening doors to untraceable, fake social accounts and the impact that it has on society. Emil is a cloud visionary and is known as one of the “fathers of OpenStack…. Continue reading The False Identity Frenzy and the Need for Authentication

Data Breaches Rise as Organizations Shift to the Cloud

As more and more organizations make the move into public clouds, a corresponding rise in cloud data breaches has followed, according to an IDC survey of 200 security decision-makers in the U.S. The survey found nearly all (98%) of the companies survey… Continue reading Data Breaches Rise as Organizations Shift to the Cloud

Beyond MFA: Adding Context For Secure Access

The pandemic forced most businesses globally to transition to remote work. With many people working from home, any semblance of a corporate security perimeter evaporated, increasing demand for virtual private networks (VPNs) and multifactor authentica… Continue reading Beyond MFA: Adding Context For Secure Access

Digital Identity: The Reality of Online Privacy

“Do you want to log in with your Facebook account?” This ever-present question looms around every corner and on almost every platform, offering a convenient way to log into various services with one simple set of credentials. What could go… Continue reading Digital Identity: The Reality of Online Privacy

Zero-Trust at Home: No-Exception Remote Work

The zero-trust approach has long been a popular strategy for organizations looking for airtight security in the workplace. By consistently questioning who a user is and what they want to do, we expel a potentially harmful blind trust; assumptions go o… Continue reading Zero-Trust at Home: No-Exception Remote Work

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker… Continue reading 3 Keys to Defending Active Directory