What is Next-Gen IGA?
Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different? Let’s start with a...
View ArticleHow to Get More Value From Your IAM and IGA Investments
Every year, the world’s organizations collectively spend tens of billions of dollars on Identity and Access Management (IAM) and Identity Governance and Administration (IGA) solutions. Yet, while there...
View ArticleAvoid the SSO Tax: Stay Secure Without Paying More
Avoid the SSO Tax: Stay Secure Without Paying More Why are businesses being forced to pay extra for basic security? Many SaaS providers lock Single Sign-On (SSO) behind their most expensive plans to...
View ArticleThe Zero Trust Security Model Companies Need Now
In the last two years, 79% of organizations have experienced an identity-related security breach, according to research from the Identity Defined Security Alliance (IDSA). That’s a truly staggering...
View Article4 Mindset Shifts for Making Zero Trust Work in the Real World
This blog was originally published by Cerby here. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice,...
View ArticleThe Impact of Security Breaches on Educational Institutions
This blog was originally published by Bravura here. Educational institutions oversee hundreds or thousands of students and faculty members daily. Therefore, it’s no surprise they deal with large...
View ArticleIf Identity is the New Perimeter, Then We Need a Compliance Standard
In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of...
View ArticleWhy Identity Automation Fails at 96% of Organizations
This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage...
View ArticleMastering Financial Services Compliance With IAM and PAM
This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the...
View Article5 Things I learned delivering Zero Trust at Adobe and Cisco
This blog was originally published by 909Cyber here. Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In...
View Article