GartnerIAM 2023: How to be Successful with Privileged Access Management

GartnerIAM 2023: How to be successful with Privileged Access Management By Hanno Ekdahl Idenhaus attended this Gartner session on privileged access management (PAM) led by Felix Gaehtens, and it was an excellent primer on how to think about privileged accounts, access management/controls around those accounts, how to approach a PAM implementation, and the continuous commitment […]

GartnerIAM 2023: How to be Successful with Privileged Access Management Read More »

Role-based Access Control in Large Organizations

Role-based Access Control in Large Organizations By Hanno Ekdahl  As organizations grow, their ability to accurately and efficiently manage access for their users to the systems and applications they need to be effective becomes increasingly difficult. To offset this complexity, most organizations invest in an identity management solution to automate user provisioning and provide a

Role-based Access Control in Large Organizations Read More »

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century By Leah Livingston By now, if you haven’t heard of OpenAI’s ChatGPT, then check out the blog that ChaptGPT wrote with us which provides a very clear definition. The chatter across industry circles has burned like wildfire on social media, podcasts, and chat forums;

Why OpenAI’s ChatGPT is the Tech Disruptor of the 21st Century Read More »

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Do you ever stop to think about how much sensitive information your organization has, and how you’re protecting it? With cyber threats on the rise, it’s more important than ever to take a proactive approach to securing your identities and access controls. That’s

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Read More »

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans Read More »

What is Cybersecurity Maturity Model Certification (CMMC)?

First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific

What is Cybersecurity Maturity Model Certification (CMMC)? Read More »

Identity and Orchestration, New Cybersecurity Amendments in New York, and More

We’ve said it before and we’ll say it again – cybersecurity is made up of all the different people who use it, and sometimes even those who abuse it. This week we want to again highlight the role that insider threats can play on your organization’s cybersecurity. While the ransomware trend overall seems to be

Identity and Orchestration, New Cybersecurity Amendments in New York, and More Read More »

Scroll to Top