CATEGORIES

News

Reliance on technology is growing

People everywhere continue to increase the amount of time they spend on their electronics. A higher usage of technology in comparison to the past is not necessarily a bad thing; however, it seems that using technology is becoming the general population’s go-to thing...

The impact that the pandemic had on Identity and Access Management (IAM) in the enterprise

According to a study based on an online survey of over 500 IT decision makers released by IDSA, over the last year, the shift to remote work has led to an increase in the number of identities, an increased focus on identity security, but a decrease in confidence in...

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...
Holidays Fuel Surge Online Phishing Scams

Holidays Fuel Surge Online Phishing Scams

We’ve all been targeted in phishing attacks — fake messages from a seemingly trusted or reputable source designed to convince you to click on a malicious link, reveal information, give unauthorized...

read more
Reliance on technology is growing

Reliance on technology is growing

People everywhere continue to increase the amount of time they spend on their electronics. A higher usage of technology in comparison to the past is not necessarily a bad thing; however, it seems that using technology is becoming the general population’s go-to thing...

Least Privilege

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...