Zilla is thrilled to welcome Bruce Spooner and his depth of IGA experience to our sales engineering team.
Understanding the New York State Department of Health Cybersecurity Requirements: What it Means for Identity Governance Processes
Zilla Security is helping customers understand and implement the NYSDOH cybersecurity requirements, which include specific identity and access management mandates such as User Access Reviews
The Emergence of Zilla AI Profiles: A Modern Solution to Roles and Groups
Zilla AI profiles offer a fresh approach to access control, addressing many of the shortcomings of traditional organizational roles.
How to Get Buy-In Across the Enterprise for IGA Projects
Gain enterprise-wide buy-in for Identity Governance and Administration (IGA) projects, and streamline processes, and improve compliance with Zilla Security.
Why I Joined Zilla Security: Product Manager Matt Albano
Matt explains his journey to Zilla Security, his professional experience, and his excitement about what Zilla Security is doing in the industry.
Enterprise Roles are Broken: The Challenges of Traditional Roles
Traditional role-based access management faces challenges like complexity, rapid obsolescence, and maintenance issues, highlighting the need for more flexible solutions…
An Auditor’s Perspective on Mastering User Access Reviews
Access reviews are crucial in maintaining security and compliance and are a vital part of the audit process…
Why I Joined Zilla: Tricia Peck
Tricia Peck explains Zilla Security’s cutting-edge IGA solutions, strong customer focus, collaborative culture, and industry-leading expertise…
The Importance of Service Account Access Reviews for Identity Security
A robust identity security posture is critical in today’s digital-first world, where organizations rely on numerous applications and systems.
You Can’t Have a Secure Cloud Without an Identity Management Strategy
Companies must secure cloud access as they face increasing security challenges due to identity and access management complexities.
At Zilla Security, Great Customer Experiences are More than a Marketing Slogan
For the third quarter in a row, G2, a leading software review and recommendation platform, recognized Zilla Security for consistently receiving an industry-high customer satisfaction rating.
Zilla Security Named Identity and Access Governance Winner in the 20th Annual, 2024 Globee Awards for Cybersecurity
Zilla Security, leading provider of identity security solutions for the enterprise today announced that it has been named the Gold Globee winner…
Zilla Security Achieves 180% YOY Revenues Powered by Growth in Enterprise Customers
Zilla Security announced outstanding results for its financial year ending January 31, 2024…
Embracing the Future: My Journey as VP of Marketing at Zilla Security
Navigating the Changing Landscape of Security In an era where security challenges for businesses are escalating, the need for innovative solutions has never been more critical. The landscape has evolved, much like the blurred lines between parenting and teaching in...
The evolving landscape of identity management in the cloud era
With high-profile data breaches and hacks becoming all too common in recent years, the need to protect user identities and secure digital assets has never been more crucial. In this blog post, we will explore the challenges surrounding identity management in the cloud...
New SEC cybersecurity disclosure rules: Are you ready?
As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better transparency and security practices. Yesterday, the U.S. Securities and Exchange Commission (SEC) introduced new rules requiring increased disclosure from public...
Overcoming the Security Challenges of Workforce Offboarding
We all know that onboarding a new employee or contractor involves creating a digital identity for them within our organizational ecosystems. This process provides them access to various applications, databases, networks, and systems necessary for their role. However,...
Announcing Zilla Security’s Expert-Led Identity Security Series
We’re thrilled to announce the launch of Zilla Security's Identity Security Series! In this informative series, Zilla experts will shed light on the critical aspects of identity and security management. Whether you are a security professional or someone interested in...
Navigating SOC 2 compliance on AWS: A survival guide
Service Organization Control 2 (SOC 2) compliance holds a pivotal role in the realm of cybersecurity. Particularly designed for service providers storing customer data in the cloud, it ensures rigorous data protection protocols are in place. SOC 2 compliance isn't...
3 ways to tackle misconfigurations in your SaaS and cloud
In today's rapidly evolving digital landscape, public cloud security breaches due to misconfigurations have become a growing concern. A recent survey conducted by the Cloud Security Alliance (CSA) revealed that 43% of the surveyed companies had experienced a public...


















