
SSPM and CIEM Are Valuable Feature Sets, but Do You Really Want a Patchwork of Identity Security?
When I talk to customers and partners, I often get questions about the plethora of point solutions related to identity …
When I talk to customers and partners, I often get questions about the plethora of point solutions related to identity …
The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights …
The most significant attack vectors globally are compromised credentials and weak access policies. Implementing IAM and following the IAM best practices can significantly improve your overall security posture.
Zilla Security helps organizations evolve from legacy IGA solutions to a scalable Identity Security Platform.
Zilla explains user access reviews, their importance, and best practices.
More cloud applications and platforms means more orphaned accounts. We talk about why that’s a problem – and what to …
So-called “FinTech” firms are shaking up the financial services industry with new approaches to solving old problems. But new companies …
The Healthcare law is mostly known for its data privacy provisions. But HIPAA has a lot to say about monitoring …
NetFlix isn’t just your favorite video streaming service. It is also a powerful development shop and technology “first mover” on …
Deepak Taneja, the CEO and Co-Founder of Zilla and Paul Roberts, Editor-in-Chief, The Security Ledger, recently hosted a webinar to look …