Zero Trust – Avoiding the Paranoid Posture of “Trust No One”

The approach for protecting our digital assets from cybercrime, fraud, and abuse has been coined by the cybersecurity industry as “Zero Trust” and even defined as an architecture approach by NIST 800-207. At first glance, it appears that the pendulum on managing digital threats seems to have turned towards an almost paranoid response: “Trust No […]

Florida’s H.B. 473 Cybersecurity Incident Liability Act

Cybersecurity, Incident Response, and Liability: Florida’s H. B. 473 Cybersecurity is a complex and dynamic field where new threats emerge daily, often outpacing traditional security measures. For Businesses, data breaches can have severe consequences, which include financial losses, reputational damage, and legal liabilities. When sensitive information, such as personal data or financial records, is compromised, […]

Building Cyber Resilience

By Sandhya Sukumar  Organization leaders worldwide are increasingly aware that one single cybersecurity solution does not exist to tackle today’s sophisticated and rapidly evolving cybercrimes. Even with strengthened defenses, threat actors can find weaknesses and vulnerabilities to infiltrate a company’s network and IT Infrastructure. Moreover, modern IT infrastructures are complex, interconnected ecosystems involving multiple organizations […]

Why Zero Trust Succeeds When Strategic Leadership Is Present

Why Zero Trust Succeeds when Strategic Leadership is Present By Leah Livingston Idenhaus attended the Cybersecurity and Privacy conference hosted by EDUCAUSE in Bellevue, Washington earlier this month. Focused on higher education, the conference facilitated sessions from university leaders and cybersecurity vendors across the country, sharing knowledge ranging from recent technology implementations and challenges in […]

Decentralized Identity and the Revolution of Web 3.0

How Decentralized Identity Will Revolutionize Web 3.0 Written by Ronald Bowron I recently attended the Gartner IAM Summit 2023 and was somewhat surprised at how much attention is now being paid to Decentralized Identity.  I am surprised because it’s been quite some time since the Sovrin Foundation, founded in 2016, has called for this new […]

Modernizing Your Identity Fabric

By Leah Livingston Idenhaus attended one of the Gartner sessions titled, “Implementing a Modern Identity Fabric” led by Vadim Lander of Broadcom and Kanishak Varshney of Ameriprise. Identity management is now a critical role in organizations’ overall cybersecurity strategy. Broadcom and Ameriprise shared their tips and experiences in working towards a more modern IAM infrastructure […]

Identity First Security

By Leah Livingston Idenhaus attended last Monday’s Gartner session titled, “Identity-First Security as the North Star for Your IAM Reimplementation” led by Mary Ruddy. She focused on a key area that’s gaining attention: Identity-First Security. As the ecosystem evolves once again, Enterprises large and small are making the necessary shifts. The best part? Identity tools […]

Building A New Foundation for Decentralized Identity

Written by Ron Bowron For those of us from the Apple IIe and the Windows 3.1 Generation, we all remember the days of “Granted until Denied” permissions and the simple Access Control List. Imagine having full access to the computer and all the system’s resources just by logging in?  We were gods in our own […]

Why Every Organization Needs Information Security Policies

Information Securities Policies

According to a study conducted by the University of Maryland, hackers are attacking computers connected to the Internet every 39 seconds, with online computers attacked on average 2,244 times a day. As the Worldwide Information Security Market is forecast to reach 170.4 billion in 2022 (Gartner), it is now not a question of “If” an […]

How To Leverage Identity in An Attack

How To Leverage Identity in An Attack

Identity Access Management (IAM) has evolved from an IT efficiency play into a foundational component of enterprise security frameworks everywhere. IAM centrally manages user accounts, credentials, roles, policies, attestation/certification, and audit/reporting for all of the organization’s users and resources. Today, IAM is an essential capability that supports both security and compliance mandates; however, organizations with […]