Zilla Security blog

The breach of Sisense last week represents one of the most dangerous breaches of this year, and potentially longer. It’s not because of what data was exfiltrated directly from Sisense...

The evolution of identity and access management in today's dynamic environment presents unprecedented challenges. As organizations transition from traditional on-premise setups to hybrid cloud ...

Zilla Security commits to driving the industry forward with a cloud-first solution that delivers on the promise of rapid time to value with the release of Zilla PO Box...

At Zilla, we are laser focused on reinventing identity security at a time when identity has become the new security perimeter for an enterprise...

Headlines of breaches frequently reference “highly sophisticated” attacks to cover up garden variety lapses in IAM programs...

Identity Governance and Administration projects (IGA) are crucial to properly secure an environment...

Zilla Security's record-breaking growth is a positive sign of market shift towards security-first...

The transition from manual, error-prone processes to automated, streamlined, and reliable User Access Reviews (UAR)...

You deployed an identity provider (IdP) solution for single-sign-on (SSO) for your cloud applications, and the project went well. You onboarded seventy-five SaaS apps to your IdP, got identity ...

Navigating the Changing Landscape of Security
In an era where security challenges for businesses are escalating, the need for innovative solutions has never been more critical. The landscape has ...

The daily news about data breaches always details what data was stolen by hackers or rogue insiders but never mentions the broken access provisioning processes that are often at fault. ...

With high-profile data breaches and hacks becoming all too common in recent years, the need to protect user identities and secure digital assets has never been more crucial. In this blog post, ...