Quantcast
Channel: Identity Defined Security Alliance
Browsing latest articles
Browse All 38 View Live

What is Next-Gen IGA?

Next-Gen IGA is the latest (for now) evolution in Identity Governance and Administration technologies, but what does this really mean? What is Next-Gen IGA and how is it different?  Let’s start with a...

View Article


How to Get More Value From Your IAM and IGA Investments

Every year, the world’s organizations collectively spend tens of billions of dollars on Identity and Access Management (IAM) and Identity Governance and Administration (IGA) solutions. Yet, while there...

View Article


Avoid the SSO Tax: Stay Secure Without Paying More

Avoid the SSO Tax: Stay Secure Without Paying More Why are businesses being forced to pay extra for basic security? Many SaaS providers lock Single Sign-On (SSO) behind their most expensive plans to...

View Article

The Zero Trust Security Model Companies Need Now

In the last two years, 79% of organizations have experienced an identity-related security breach, according to research from the Identity Defined Security Alliance (IDSA). That’s a truly staggering...

View Article

Image may be NSFW.
Clik here to view.

4 Mindset Shifts for Making Zero Trust Work in the Real World

This blog was originally published by Cerby here. Zero Trust has become one of the cybersecurity world’s most misunderstood buzzwords. In theory, it’s simple: never trust, always verify. In practice,...

View Article


Image may be NSFW.
Clik here to view.

The Impact of Security Breaches on Educational Institutions

This blog was originally published by Bravura here.   Educational institutions oversee hundreds or thousands of students and faculty members daily. Therefore, it’s no surprise they deal with large...

View Article

If Identity is the New Perimeter, Then We Need a Compliance Standard

In the late 1990s, exploitable vulnerabilities began to traverse the young Internet, proving that poorly coded and tested software could be exploited for fun, financial gain, and the exfiltration of...

View Article

Image may be NSFW.
Clik here to view.

Why Identity Automation Fails at 96% of Organizations

This blog was originally published by Cerby here. Enterprise security teams have invested billions in identity security infrastructure over the past decade, building sophisticated systems to manage...

View Article


Mastering Financial Services Compliance With IAM and PAM

This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the...

View Article


Image may be NSFW.
Clik here to view.

5 Things I learned delivering Zero Trust at Adobe and Cisco

This blog was originally published by 909Cyber here.   Between 2017 and 2022 I was fortunate to be the leader responsible for the strategy and execution of Zero Trust initiatives at Adobe and Cisco. In...

View Article
Browsing latest articles
Browse All 38 View Live


Latest Images