


Bulletproof access provisioning is essential to identity security
The daily news about data breaches always details what data was stolen by hackers or rogue insiders but never mentions the broken access provisioning processes that are often at fault. Establishing the right joiner-mover-leaver and access request processes is critical...
Segregation of Duties (SoD) controls: A lesson learned from RepairPal’s $2.7 million mistake
Imagine waking up one day to discover that a single person diverted $2.7 million from your company’s accounts while operating right under your nose for nearly a decade. This isn’t a plot from a heist movie—it’s a real-life lesson on the importance of...
New SEC cybersecurity disclosure rules: Are you ready?
As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better transparency and security practices. Yesterday, the U.S. Securities and Exchange Commission (SEC) introduced new rules requiring increased disclosure from public...