Why break into a single company to get access to their data, when you can break into one aggregator to gain access to hundreds? The breach of Sisense last week represents one of the most dangerous breaches of this year, and potentially longer. It’s not because of what...
I’m delighted to share the news of my recent appointment to Zilla Security’s Advisory Board, marking a new, exciting chapter in my journey to help shape the future of identity security and governance. In an era where the digital landscape is expanding...
At Zilla Security, we are on a mission to build a comprehensive Identity Governance solution. Comprehensive implies the ability to automate permissions management holistically across all systems that our customers use. This includes SaaS applications, Cloud...
At Zilla, we are laser focused on reinventing identity security at a time when identity has become the new security perimeter for an enterprise. So, it is with great pride that we announce that Zilla Security was named the Gold Globee winner in the Identity and Access...
tl;dr – headlines of breaches frequently reference “highly sophisticated” attacks to cover up garden variety lapses in IAM programs. The downside is that mindshare and budget get taken down a blind alley looking for sophisticated solutions and directed away from...
Identity Governance and Administration projects (IGA) are crucial to properly secure an environment, complete audits, and boost operational efficiency through the audit process. However, legacy Identity Governance projects have a reputation for failure. Gartner...