Good Governance Includes the Outliers
In his book, “Outliers: The Story of Success,” Malcom Gladwell says that outliers are often extraordinary individuals. Think Benjamin Franklin, Mozart, Bill Gates and even sports phenoms like tennis...
View ArticleWhat’s the Key Enabler for Security Incident Response?
A modern Security Incident Response solution is a system of interconnected components working together to identify known and unknown threats and to prevent or limit the damage done by those threats....
View ArticleDriving Deeper into Cloud Identity Governance
SailPoint took a very important step today, announcing our intent to acquire two companies – Orkus and OverwatchID – both of which will help us to extend our ability to more deeply govern access...
View ArticleSamsung BioLogics Builds Identity Governance from the Ground Up
Samsung BioLogics is headquartered in South Korea and manufactures biopharmaceutical products. Founded in 2011, the company entered the biopharmaceutical industry during a time in which the industry...
View ArticleObservations from SecureWorld Detroit
Just a couple of weeks ago, security professionals, including myself, ascended upon SecureWorld Detroit to hear the latest from top security industry experts. I also had the great opportunity to be...
View Article2019 Market Pulse Survey: If Time is Money, Then Identity Pays
Consider this. You are an IT leader at an enterprise organization. You have not been living under a rock, and therefore are well aware that companies across the world struggle with cybersecurity....
View ArticleZero Trust in the Digital Transformation Age
In the digital transformation age, enterprises are shifting from traditional perimeter security approaches to the Zero Trust framework to protect their most sensitive networks. Centered on the belief...
View ArticleBack to School: National Cybersecurity Awareness Month Edition
My first cybersecurity memory is working on my Commodore 64 computer with a military-grade type dial-up modem. This was before the Internet and I would use a BBS systems (bulletin board systems) where...
View ArticleWhat Does Cloud-First and Identity Security Really Mean to Business?
As organizations adopt new technologies and evolve their business protocols through Digital Transformation, what’s the effect on identity and access management (IAM)? In the past, IAM was focused on...
View ArticleAnswer These Cybersecurity Questions & We Will Tell You If You’re...
.qmn_quiz_container .qmn_btn, .qmn_quiz_container .btn {height: auto; width: auto;} .qmn_pagination.border {border: none !important;} .qsm-quiz-container.qmn_quiz_container.mlw_qmn_quiz,...
View ArticleIdentityNow Helps Online Retailer Revitalize Its Identity Management Program
Founded just after the pop of the dot-com bubble, this U.S.-based home goods retailer sells more than 14 million household items from thousands of providers. To create an exceptional online shopping...
View ArticleIdentity Imperatives for IT Modernization
Chances are, no matter the size of your organization, you’re being challenged to meet shifting expectations of your users. Across industries and geographies, we’ve seen how organizations have used...
View ArticleThe Step-by-Step Guide to CCPA Compliance
California is just one in a string of many states to enact legislation that puts the responsibility of privacy in the hands of businesses. There are 54 days until the CCPA takes effect, but who’s...
View ArticleBalancing Zero Trust with a strong identity strategy and AI
The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what...
View ArticleEnable Business Growth and Strengthen Security
Consumers are demanding rapid adoption of a purely digital landscape, and at the center of today’s challenges are compromised identities. What do threat actors use to gain access to your data?...
View ArticleMoving Toward Effective RPA Governance
Software bots are swarming onto enterprise networks at an astounding rate, and for good reason. These bots can free staff from mundane and repetitive tasks, tirelessly process transactions, manage...
View Article2019 Market Pulse Survey: Good Bot, Bad Bot
There are two sides to every coin. This analogy is especially true when we talk about the ever-present use of software bots in organizations today. On one side of the coin, we can all agree that bots...
View ArticleThe Importance of Identity in a Hybrid IT World
If your organization is like many, you’re moving more and more applications to the cloud or introducing numerous APIs into your environment as a part your digital transformation. Wherever you are in...
View ArticlePayment Technology Provider Achieves Automation & Compliance with SailPoint
This German company assists over 34,000 customers in one hundred different countries with electronic payment transaction solutions and risk management. As a financial services company that is newly...
View ArticleBetter Metrics with Prometheus
Generating millions of metrics from microservices and infrastructure is easy (perhaps too easy). Collecting those metrics and sculpting them into meaningful dashboards and alarms is a challenge...
View Article
More Pages to Explore .....