The evolving landscape of identity management in the cloud era

The evolving landscape of identity management in the cloud era

With high-profile data breaches and hacks becoming all too common in recent years, the need to protect user identities and secure digital assets has never been more crucial. In this blog post, we will explore the challenges surrounding identity management in the cloud...
A new lens for IGA

A new lens for IGA

This year, it’s been fun to get out of the office and meet in-person with customers, prospects and partners. Since many recent conversations have been about how identity is taking center stage in IT and security circles, I wanted to share my thoughts on the changes...
New SEC cybersecurity disclosure rules: Are you ready?

New SEC cybersecurity disclosure rules: Are you ready?

As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better transparency and security practices. Yesterday, the U.S. Securities and Exchange Commission (SEC) introduced new rules requiring increased disclosure from public...
Overcoming the Security Challenges of Workforce Offboarding

Overcoming the Security Challenges of Workforce Offboarding

We all know that onboarding a new employee or contractor involves creating a digital identity for them within our organizational ecosystems. This process provides them access to various applications, databases, networks, and systems necessary for their role. However,...