Reflections on Identiverse 2024 — Agility and AI Dominate

Reflections on Identiverse 2024 — Agility and AI Dominate

A full week in Vegas is…a lot. Yet, Identiverse 2024 was a standout event and one of the best trade shows I’ve ever attended. With more than 250 speakers and 3,000+ attendees, we were able to engage in deep discussions about the intersection of identity and...
Canaries are the Keys to Success in the Cloud

Canaries are the Keys to Success in the Cloud

tl;dr – By scattering tripwires throughout your environment in canary tokens you can be alerted to attackers in your environment before any other tool detects something is wrong. The adoption of Cloud and SaaS services in modern architectures makes it necessary to...
Sisense Breach – Stealing a Valet Lockbox

Sisense Breach – Stealing a Valet Lockbox

Why break into a single company to get access to their data, when you can break into one aggregator to gain access to hundreds? The breach of Sisense last week represents one of the most dangerous breaches of this year, and potentially longer. It’s not because of what...
The High Society Sophisticated Threat Actors

The High Society Sophisticated Threat Actors

tl;dr – headlines of breaches frequently reference “highly sophisticated” attacks to cover up garden variety lapses in IAM programs. The downside is that mindshare and budget get taken down a blind alley looking for sophisticated solutions and directed away from...
Top 3 Reasons IGA Projects Fail

Top 3 Reasons IGA Projects Fail

Identity Governance and Administration projects (IGA) are crucial to properly secure an environment, complete audits, and boost operational efficiency through the audit process. However, legacy Identity Governance projects have a reputation for failure. Gartner...