Identity Management & Cybersecurity News

Are You Maximizing Your IAM Investment? 

By Sandhya Sukumar  In this era of evolving cyber threats, strengthening the IAM space is the top security goal for every organization. When IT leaders contemplate IAM solutions, their primary concern is alignment – ensuring that the IAM strategy not only addresses current cyber threats but also seamlessly aligns with compliance goals, budget constraints, and […]

Are You Maximizing Your IAM Investment?  Read More »

Building Cyber Resilience: Part II

By Sandhya Sukumar  In the first article on this topic we discussed the why, the what, and the importance of Cyber Resilience, including its challenges. In this article, let’s take a look at some of the components involved when building a Cyber Resilience strategy:  A holistic cyber resilience strategy encompasses cybersecurity measures across all levels

Building Cyber Resilience: Part II Read More »

What’s the Big Idea: Identity Management Projects that Deliver

What’s the Big Idea: Identity Management Projects that Deliver   By Hanno Ekdahl In the intricate tapestry of modern business, Identity Management (IDM) emerges as a critical thread, weaving together security, efficiency, and user experience. Identity management projects are not mere technical endeavors; they are strategic initiatives that demand a harmonious blend of design, technology, and

What’s the Big Idea: Identity Management Projects that Deliver Read More »

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional

In today’s digital world, organizations rely on technology to conduct their operations efficiently. However, this rapid digital transformation has also opened up new avenues for cyber threats. While many organizations invest in cybersecurity measures, there is a pervasive overconfidence about the maturity of their actual cybersecurity posture. In this blog, we will shed light on

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional Read More »

The Difference Between Identity Access Management (IAM) and Identity Governance Administration (IGA)

Written by TJ Rubeck As the scope and use of digital identities and access expands, so do the risks associated with managing them. With more and more applications required for employees to do their jobs, granting and managing access rights becomes increasingly challenging for organizations. As a result, Identity Access Management (IAM) and Identity Governance

The Difference Between Identity Access Management (IAM) and Identity Governance Administration (IGA) Read More »

Gartner 2023: The State of IAM Program Management 

Gartner 2023: The State of IAM Program Management  By Addy Agee The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable

Gartner 2023: The State of IAM Program Management  Read More »

Identity First Security

By Leah Livingston Idenhaus attended last Monday’s Gartner session titled, “Identity-First Security as the North Star for Your IAM Reimplementation” led by Mary Ruddy. She focused on a key area that’s gaining attention: Identity-First Security. As the ecosystem evolves once again, Enterprises large and small are making the necessary shifts. The best part? Identity tools

Identity First Security Read More »

AI to the Rescue for Identity Governance Access Certifications 

AI to the Rescue for Identity Governance Access Certifications … not so fast! Written by Ron Bowron In today’s digital world, businesses face numerous cybersecurity threats, making it essential to ensure that only authorized personnel can access sensitive data. Identity and Governance Access Certification Campaigns are an effective way to certify and review user access

AI to the Rescue for Identity Governance Access Certifications  Read More »

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Do you ever stop to think about how much sensitive information your organization has, and how you’re protecting it? With cyber threats on the rise, it’s more important than ever to take a proactive approach to securing your identities and access controls. That’s

Understanding Identity Threat Detection & Response (ITDR): A Comprehensive Approach to Cybersecurity Read More »

Scroll to Top