Sisense Breach – Stealing a Valet Lockbox

Sisense Breach – Stealing a Valet Lockbox

Why break into a single company to get access to their data, when you can break into one aggregator to gain access to hundreds? The breach of Sisense last week represents one of the most dangerous breaches of this year, and potentially longer. It’s not because of what...
Winning a Gold Globee Reaffirms Approach to Identity Security

Winning a Gold Globee Reaffirms Approach to Identity Security

At Zilla, we are laser focused on reinventing identity security at a time when identity has become the new security perimeter for an enterprise. So, it is with great pride that we announce that Zilla Security was named the Gold Globee winner in the Identity and Access...
The High Society Sophisticated Threat Actors

The High Society Sophisticated Threat Actors

tl;dr – headlines of breaches frequently reference “highly sophisticated” attacks to cover up garden variety lapses in IAM programs. The downside is that mindshare and budget get taken down a blind alley looking for sophisticated solutions and directed away from...
Top 3 Reasons IGA Projects Fail

Top 3 Reasons IGA Projects Fail

Identity Governance and Administration projects (IGA) are crucial to properly secure an environment, complete audits, and boost operational efficiency through the audit process. However, legacy Identity Governance projects have a reputation for failure. Gartner...