Top 10 Enterprise Identity Management Software Solutions 

Top 10 Enterprise Identity Management Software Solutions 

Like a Swiss watch, your organization has hundreds, if not thousands, of moving parts. Each employee accesses a multitude of different documents, systems, and software every day, and they ...
Read More
Mastering the Identity Management Lifecycle The Essential Guide

Mastering the Identity Management Lifecycle: The Essential Guide

Imagine this: Your company part ways with an unhappy ex-employee who still has access to cloud resources and applications. Although you assume they won’t take sensitive data to a ...
Read More

MITRE-like Framework for Identity Security

A pivotal shift from perimeter-based security measures is being witnessed in the rapidly shifting landscape of cybersecurity. Identity management is becoming more complex with the move to the ...
Read More
7 Tips to Make Sense of the Gartner IAM Magic Quadrant

7 Tips to Make Sense of the Gartner IAM Magic Quadrant

The world of Identity and Access Management (IAM) is not just about selecting a vendor – it’s about selecting the right vendor. In a rapidly evolving sector, making informed decisions is ...
Read More
Best Practices to Detect and Respond to a Compromised Identity

Best Practices to Detect and Respond to a Compromised Identity

So, it looks like your organization was hacked, you are almost sure, but it’s still under investigation. What should you do to avoid immediate damage ? Cybersecurity breaches revolving around ...
Read More

Okta Threat Hunting: Auditing Okta Logs Part 2

Update Note Due to the recent events at MGM, which included the compromise of MGM’s Okta tenant, and the surge in attacks of Okta Admins,  we have updated the threat-hunting article, adding ...
Read More
What is ITDR (Identity Threat Detection & Response) and Things to Look Out For

What is ITDR (Identity Threat Detection & Response) and Things to Look Out For

In the brick-and-mortar world, our physical presence assumes our identity. But the virtual world disrupts this age-old presumption. From pseudonyms to shadow identities and avatars to digital ...
Read More
CIEM vs. ITDR

CIEM vs. ITDR

If your organization hasn’t already adopted the Cloud, you’ll be met with one question: “Why?” The shift towards Cloud computing brings unprecedented advantages, yet it ...
Read More
Zero Trust Maturity Model: A Definitive Guide

Zero Trust Maturity Model: A Definitive Guide

Identity is a topic philosophers have struggled with for years. Identity as a concept spawns many smaller questions, such as “What makes you who you are?”. In the realm of ...
Read More