Select Page
The evolving landscape of identity management in the cloud era

The evolving landscape of identity management in the cloud era

With high-profile data breaches and hacks becoming all too common in recent years, the need to protect user identities and secure digital assets has never been more crucial. In this blog post, we will explore the challenges surrounding identity management in the cloud...
A new lens for IGA

A new lens for IGA

This year, it’s been fun to get out of the office and meet in-person with customers, prospects and partners. Since many recent conversations have been about how identity is taking center stage in IT and security circles, I wanted to share my thoughts on the changes...
Overcoming the Security Challenges of Workforce Offboarding

Overcoming the Security Challenges of Workforce Offboarding

We all know that onboarding a new employee or contractor involves creating a digital identity for them within our organizational ecosystems. This process provides them access to various applications, databases, networks, and systems necessary for their role. However,...
Navigating SOC 2 compliance on AWS: A survival guide

Navigating SOC 2 compliance on AWS: A survival guide

Service Organization Control 2 (SOC 2) compliance holds a pivotal role in the realm of cybersecurity. Particularly designed for service providers storing customer data in the cloud, it ensures rigorous data protection protocols are in place. SOC 2 compliance...