Our blog
The problems with featherweight IGA – what Identity Provider vendors don’t tell you!
You deployed an identity provider (IdP) solution for single-sign-on (SSO) for your cloud applications,...
Embracing the Future: My Journey as VP of Marketing at Zilla Security
Navigating the Changing Landscape of Security In an era where security challenges for businesses are...
Bulletproof access provisioning is essential to identity security
The daily news about data breaches always details what data was stolen by hackers or rogue insiders but...
SSPM and CIEM are valuable feature sets, but do you really want a patchwork of identity security?
When I talk to customers and partners, I often get questions about the plethora of point solutions...
The evolving landscape of identity management in the cloud era
With high-profile data breaches and hacks becoming all too common in recent years, the need to protect...
Segregation of Duties (SoD) controls: A lesson learned from RepairPal’s $2.7 million mistake
Identity is taking center stage in IT and security circles, so I wanted to share my thoughts on changes driving Identity Governance and Administration (IGA).
A new lens for IGA
Identity is taking center stage in IT and security circles, so I wanted to share my thoughts on changes driving Identity Governance and Administration (IGA).
New SEC cybersecurity disclosure rules: Are you ready?
As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better...