identity management

Combining identity and security strategies to mitigate risks
Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining …

4 identity security trends to watch in 2023
While many of the tried and true best security hygiene practices remain, we’ll face new and complex business challenges related to how we work, the systems we use, threats and …

Enterprises waste money on identity tools they don’t use
Misguided enterprise investment in multiple identity tools is proving insufficient in defending against today’s threat landscape, according to One Identity. 96% of companies …

Overcoming unique cybersecurity challenges in schools
A school’s ecosystem is far different from that of the typical enterprise. Not only does a school district face the monumental task of educating our upcoming generations, but …

Moving your Microsoft environment to zero trust
Zero trust is a concept that’s easy to grasp but incredibly difficult to implement. It touches almost every system, component, application, and resource within an enterprise, …

cert-manager: Automatically provision and manage TLS certificates in Kubernetes
cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those …

IT leaders struggling to address identity sprawl
Radiant Logic unveiled the Identity Data Management: Roadblock or Business Enabler report, providing insights into today’s identity management challenges. Gartner Peer …

Why firms need to harness identity management before it spirals into an identity crisis
Digital transformation is at the top of every organization’s agenda today. But while it is easy to make bold, forward-looking plans on paper, the reality of implementing …

Zero trust adoption: Industry-specific challenges and implementation strategies
Organizations across many industries are in the throes of a journey to implement the zero trust security model to increase their cybersecurity posture. Through my experience …

Top tech for enterprise identity governance and security
Clear Skye and Gradient Flow announced the findings of their survey exploring the state of identity governance and security in the enterprise. The survey questioned 500+ …

Manage and monitor third-party identities to protect your organization
SecZetta shared a research that demonstrates a clear misalignment between the strategies organizations currently use and what is actually required to protect them from …

4 steps for building an orchestrated authorization policy for zero trust
There is a great deal of emphasis placed on the zero-trust approach with respect to access. Looking beyond authentication (the act of verifying that someone is who they say …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy