La amenaza oculta de la ciberseguridad en las organizaciones: Aplicaciones no...
Descubriendo la verdad sobre las aplicaciones no federadas a través de una investigación independiente. De vez en cuando surge una nueva categoría de riesgo, normalmente impulsada por un...
View ArticleEstrategias de cumplimiento para soluciones de gestión de identidad basadas...
Introducción Una cadena de bloques (blockchain) es un sistema virtualmente distribuido que consiste en una serie de registros de datos inmutables con fecha y hora, con cada “bloque” de información...
View ArticleIdentity Management? Zero Trust? PIM? Succeed by getting the basics right.
In today’s rapidly evolving online landscape, terms like zero trust, PIM (or Privileged Identity Management), and a series of other acronyms can leave the average person scratching their head. Amidst...
View ArticleNonstandard Applications in an Identity-First World
This articles was originally published by Cerby. You can read the article here. Nearly every web application (app) today requires us to verify who we are by signing in with a username and password or...
View ArticleData Security From the Perspective of an Identity and Access Management...
This article was originally published by IDPro. You can view the original article here. Introduction Both the identity and the data security world can be vast and complex these days. It’s sometimes...
View ArticleNIST Cybersecurity Framework 2.0 – What’s New & What You Need to Know
This article was originally published by BeyondTrust. You can view the article here. Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance...
View ArticleIdentity Management Day and the Importance of Strong Identity Security
This article was original published by Saviynt. You can view the original article here. Identity Management Day, held on the second Tuesday of April, is a day of awareness to educate business leaders,...
View ArticleWorkforce Identity Security Best Practices: The Essential Role of Unified...
This article was originally published by BeyondTrust. You can view the article here. In any corporate environment, every worker needs access to multiple systems from day one (Active Directory, Okta,...
View ArticleWhy Identity Security Should Be the Basis of Modern Cybersecurity
This article was originally published by BeyondTrust. You can view the article here. An Interview with the Authors of the latest book in the Attack Vector series, Morey J. Haber, Chief Security...
View ArticleAsk the Cybersecurity Experts: Why the Success of Modern Cyber Defense Hinges...
This article was original published by BeyondTrust. You can view the article here. An interview with cybersecurity experts from BeyondTrust: Janine Seebeck, Chief Executive Officer; Morey J. Haber,...
View ArticleBuilding Resilient and Secure Networks for Government Agencies at the Zero...
Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a...
View ArticleIdentity Governance Drivers in the 2nd Half of 2024
As they approach the second half of 2024, identity governance managers must reevaluate their priorities to ensure their security posture keeps pace with how their businesses are evolving. In The State...
View ArticleWhy Healthy IGA Is Essential for Effective Cybersecurity
Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an...
View ArticleNIST Cybersecurity Framework 2.0 And Why It Matters
The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most...
View ArticleA Modern Approach Is Key to Connecting IGA to SaaS Applications
As more organizations migrate to cloud-based SaaS applications, user access management, security, and compliance professionals face a myriad of new challenges. Reports suggest that a typical...
View Article