The Three Branches of Identity Governance

In addition to COVID, 2020 has also happened to be an election year. With US elections mostly completed and the US government in transition – whatever the outcome – certainly consideration of government and governance is top of mind for everyone at thi… Continue reading The Three Branches of Identity Governance

3 simple ways to drastically reduce Active Directory administration costs [E-book]

Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more diverse than ever. Increasing cloud adoption coupled with remote work has made identity and acce… Continue reading 3 simple ways to drastically reduce Active Directory administration costs [E-book]

Building on the IAM Benefits of SSO with MFA and Privileged Access Management

In part one of this post, we talked about why identity access management (IAM) is important.  In that discussion, we identified three types of IAM: Single Sign On Multi-Factor Authentication Privileged Access Management We discussed the different … Continue reading Building on the IAM Benefits of SSO with MFA and Privileged Access Management

Understanding Single Sign On as a Means of Identity Access Management

I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created an account with around 10 years ago for my kids. They had sent me a code t… Continue reading Understanding Single Sign On as a Means of Identity Access Management

Identity and Access Management has a Password Problem

Recent research from Enterprise Management Associates (EMA) found that a staggering 60% of organizations have experienced a security breach in the past year. Digging into the details, the leading source of breaches (24.4%) was once again due to comprom… Continue reading Identity and Access Management has a Password Problem

Cloud Under Pressure: Keeping AWS Projects Secure

Amazon Web Services (AWS) allow organizations to take advantage of numerous services and capabilities. As the number of available options under the cloud infrastructure of the company grows, so too do the security risks and the possible weaknesses. AWS… Continue reading Cloud Under Pressure: Keeping AWS Projects Secure

Tozny introduces encrypted identity tool as part of security service platform

Tozny, a Portland, Oregon startup that wants to help companies more easily incorporate encryption into their programs and processes, introduced TozID today. It is an identity and access control tool that can work independently or in conjunction with the company’s other encryption tools. “Basically we have a Security as a Service platform, and it’s designed […] Continue reading Tozny introduces encrypted identity tool as part of security service platform

Overcoming Hurdles to Implementing PAM

Regardless of the type of attack, a majority of cyber attacks take advantage of weaknesses in access management in order to exploit privileged access in some way. Privileged access management (PAM) is a crucial element of effective cybersecurity, but a… Continue reading Overcoming Hurdles to Implementing PAM

CIAM vs IAM: 5 Steps to Choosing the Best Identity Management Solution for your Enterprise

Customer Experience: Expectations and Outcomes To succeed in today’s evolving digital ecosystem, enterprises must meet the global demand for a personalized customer experience (CX) while maintaining security, privacy, and convenience. In fact, ma… Continue reading CIAM vs IAM: 5 Steps to Choosing the Best Identity Management Solution for your Enterprise

Join Us at the Identity and Access Morning Briefing – August 15, 2019

Thinking about attending the upcoming Identity and Access Morning Briefing on Thursday 15th August 2019, in Sydney, Australia?
Since the Notifiable Data Breaches (NDB) started on 22 Feb 2018, the Office of the Australian Information Commissioner (OAIC)… Continue reading Join Us at the Identity and Access Morning Briefing – August 15, 2019