Between a Rock and a Hard Place: The IT Help Desk Manager’s Password Dilemma

Long-time Saturday Night Live fans will likely remember Nick Burns – a.k.a. “your company’s computer guy” – a popular recurring character played by Jimmy Fallon in the early 2000s. Sporting a pocket protector and blaring…
The post Between a Rock and … Continue reading Between a Rock and a Hard Place: The IT Help Desk Manager’s Password Dilemma

It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic shift, this push…
The post It’s I… Continue reading It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

6 Simple Remote Work Security Mistakes and How to Avoid Them

Since the COVID-19 outbreak there have been countless headlines and viral social media posts exposing some of the worst remote security faux pas, ranging from the financially devastating to the easily avoidable to the outright…
The post 6 Simple Remo… Continue reading 6 Simple Remote Work Security Mistakes and How to Avoid Them

Four Trends Shaping the Future of Access Management

From a remote employee using a personal device for work, to a marketing consultant logging into a shared social media account, to a customer authenticating to use a SaaS app, someone is accessing your organization’s…
The post Four Trends Shaping the … Continue reading Four Trends Shaping the Future of Access Management

A Step in the Right Direction: The IoT Cybersecurity Improvement Act

A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital business transformation. Experts project that by…
The post A Step in … Continue reading A Step in the Right Direction: The IoT Cybersecurity Improvement Act

Why Desktop MFA is Essential to your Endpoint Security

An employee’s work laptop can be a treasure trove for any malicious actor who can get access to it. Think about it. Many of the apps you use on your laptop don’t ask you for credentials, especially if your organization doesn’t have strong multi-factor…. Continue reading Why Desktop MFA is Essential to your Endpoint Security

Simple Rules for Smart IAM Solutions

Evaluating IAM solutions can be complex. Understanding how to evaluate security analytics is key to making decisions. In this day and age of Machine Learning (ML), analytics systems can become very complex, very quickly. Having…
The post Simple Rules… Continue reading Simple Rules for Smart IAM Solutions