Zilla Security blog

Matt explains his journey to Zilla Security, his professional experience, and his excitement about what Zilla Security is doing in the industry.

Traditional role-based access management faces challenges like complexity, rapid obsolescence, and maintenance issues, highlighting the need for more flexible solutions...

Access reviews are crucial in maintaining security and compliance and are a vital part of the audit process...

Tricia Peck explains Zilla Security's cutting-edge IGA solutions, strong customer focus, collaborative culture, and industry-leading expertise...

A robust identity security posture is critical in today’s digital-first world, where organizations rely on numerous applications and systems.

See how Zilla's identity governance platform generates comprehensive audit reports, ensuring seamless adherence to NYDFS requirements.

Large-scale breaches, such as the recent Snowflake incident, highlight the importance of a strong identity security posture. Use these tips to improve your identity security posture.

Companies must secure cloud access as they face increasing security challenges due to identity and access management complexities.

The value you get from IGA (Identity Governance and Administration) solutions has always been proportional to your governance.

"The power of the identity engine," — how to keep everything secure and compliant in an increasingly complex hybrid cloud world.

Snowflake accounts are under attack from malware password stealers resulting in large data breaches for at least 6 known Snowflake customers...

Most enterprise IT environments are more complex and dynamic than the idealized environments that security SaaS vendors imagine when they develop solutions.