Are You Maximizing Your IAM Investment? 

By Sandhya Sukumar  In this era of evolving cyber threats, strengthening the IAM space is the top security goal for every organization. When IT leaders contemplate IAM solutions, their primary concern is alignment – ensuring that the IAM strategy not only addresses current cyber threats but also seamlessly aligns with compliance goals, budget constraints, and […]

Building Cyber Resilience: Part II

By Sandhya Sukumar  In the first article on this topic we discussed the why, the what, and the importance of Cyber Resilience, including its challenges. In this article, let’s take a look at some of the components involved when building a Cyber Resilience strategy:  A holistic cyber resilience strategy encompasses cybersecurity measures across all levels […]

The Importance of Multiple IT Environments

By Richard Hawes Very early in my IT career, I learned that, as a matter of general best practice, companies almost always have at least two environments for critical systems and usually three for application development and management. Some companies, depending on their complexity and needs, have more than that. This is to enable the […]

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional

In today’s digital world, organizations rely on technology to conduct their operations efficiently. However, this rapid digital transformation has also opened up new avenues for cyber threats. While many organizations invest in cybersecurity measures, there is a pervasive overconfidence about the maturity of their actual cybersecurity posture. In this blog, we will shed light on […]

Gartner 2023: The State of IAM Program Management 

Gartner 2023: The State of IAM Program Management  By Addy Agee The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable […]

Identity First Security

By Leah Livingston Idenhaus attended last Monday’s Gartner session titled, “Identity-First Security as the North Star for Your IAM Reimplementation” led by Mary Ruddy. She focused on a key area that’s gaining attention: Identity-First Security. As the ecosystem evolves once again, Enterprises large and small are making the necessary shifts. The best part? Identity tools […]

AI to the Rescue for Identity Governance Access Certifications 

AI to the Rescue for Identity Governance Access Certifications … not so fast! Written by Ron Bowron In today’s digital world, businesses face numerous cybersecurity threats, making it essential to ensure that only authorized personnel can access sensitive data. Identity and Governance Access Certification Campaigns are an effective way to certify and review user access […]