The daily news about data breaches always details what data was stolen by hackers or rogue insiders but never mentions the broken access provisioning processes that are often at fault. Establishing the right joiner-mover-leaver and access request processes is critical...

A new lens for IGA
Identity is taking center stage in IT and security circles, so I wanted to share my thoughts on changes driving Identity Governance and Administration (IGA).
Identity security complements cloud security posture management
Cloud Security Posture Management (CSPM) solutions help you secure your cloud platforms and your development pipeline on those platforms. CSPM provides you with an infrastructure-centric perspective on cloud security. The cloud, however, is more than just platforms...
SSPM and CIEM are valuable feature sets, but do you really want a patchwork of identity security?
When I talk to customers and partners, I often get questions about the plethora of point solutions related to identity security and how they differ from one another. The growing alphabet soup of industry acronyms has made it increasingly difficult for overloaded...
Why enterprises struggle with legacy identity governance & administration
Traditionally, Identity Governance and Administration (IGA) solutions are known to help organizations improve their compliance and audit performance. But for companies looking for a solution that includes cloud platforms and SaaS services with fast time to value,...
Identity governance meets cloud security in identity security
I’m excited to announce that Zilla Security has closed a $13.5M Series A venture round with Tola Capital, FirstMark Capital, and Pillar VC. Zilla’s mission is to automate identity security for organizations of all sizes and help businesses grow their cloud footprint...
Access compliance for FinTech start-ups: What to know
So-called “FinTech” firms are shaking up the financial services industry with new approaches to solving old problems. But new companies still have to play by the old rules, including financial industry regulations for monitoring user entitlements and access.Here’s...
Context is the new perimeter
A new adage is emerging in the cloud security world that context is the new perimeter. If you believe this, and there is every reason to believe it, then it begs the question - Where is this context? Why has the shift to the cloud made context so much more important?...
Cloud misconfigurations
In my previous blog, I outlined the enormous benefits of the rapidly growing SaaS and cloud services model for software, and also touched on the inherent security risks of misconfigurations and how they’re going largely unaddressed. These risks are substantial, so...