Quantcast
Channel: Identity Defined Security Alliance
Browsing all 15 articles
Browse latest View live

La amenaza oculta de la ciberseguridad en las organizaciones: Aplicaciones no...

Descubriendo la verdad sobre las aplicaciones no federadas a través de una investigación independiente. De vez en cuando surge una nueva categoría de riesgo, normalmente impulsada por un...

View Article


Image may be NSFW.
Clik here to view.

Estrategias de cumplimiento para soluciones de gestión de identidad basadas...

Introducción Una cadena de bloques (blockchain) es un sistema virtualmente distribuido que consiste en una serie de registros de datos inmutables con fecha y hora, con cada “bloque” de información...

View Article

Identity Management? Zero Trust? PIM? Succeed by getting the basics right.

In today’s rapidly evolving online landscape, terms like zero trust, PIM (or Privileged Identity Management), and a series of other acronyms can leave the average person scratching their head. Amidst...

View Article

Image may be NSFW.
Clik here to view.

Nonstandard Applications in an Identity-First World

This articles was originally published by Cerby. You can read the article here. Nearly every web application (app) today requires us to verify who we are by signing in with a username and password or...

View Article

Data Security From the Perspective of an Identity and Access Management...

This article was originally published by IDPro. You can view the original article here. Introduction Both the identity and the data security world can be vast and complex these days. It’s sometimes...

View Article


NIST Cybersecurity Framework 2.0 – What’s New & What You Need to Know

This article was originally published by BeyondTrust. You can view the article here. Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance...

View Article

Identity Management Day and the Importance of Strong Identity Security

This article was original published by Saviynt. You can view the original article here. Identity Management Day, held on the second Tuesday of April, is a day of awareness to educate business leaders,...

View Article

Workforce Identity Security Best Practices: The Essential Role of Unified...

This article was originally published by BeyondTrust. You can view the article here. In any corporate environment, every worker needs access to multiple systems from day one (Active Directory, Okta,...

View Article


Why Identity Security Should Be the Basis of Modern Cybersecurity

This article was originally published by BeyondTrust. You can view the article here. An Interview with the Authors of the latest book in the Attack Vector series, Morey J. Haber, Chief Security...

View Article


Ask the Cybersecurity Experts: Why the Success of Modern Cyber Defense Hinges...

This article was original published by BeyondTrust. You can view the article here. An interview with cybersecurity experts from BeyondTrust: Janine Seebeck, Chief Executive Officer; Morey J. Haber,...

View Article

Image may be NSFW.
Clik here to view.

Building Resilient and Secure Networks for Government Agencies at the Zero...

Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a...

View Article

Identity Governance Drivers in the 2nd Half of 2024

As they approach the second half of 2024, identity governance managers must reevaluate their priorities to ensure their security posture keeps pace with how their businesses are evolving. In The State...

View Article

Why Healthy IGA Is Essential for Effective Cybersecurity

Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an...

View Article


NIST Cybersecurity Framework 2.0 And Why It Matters

The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most...

View Article

A Modern Approach Is Key to Connecting IGA to SaaS Applications

As more organizations migrate to cloud-based SaaS applications, user access management, security, and compliance professionals face a myriad of new challenges. Reports suggest that a typical...

View Article

Browsing all 15 articles
Browse latest View live