CATEGORIES

News

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...

Happy World Password Day! (and why you should care)

Today is World Password Day. Every year on the first Thursday in May World Password Day promotes better password habits. Despite what is going on in the world this might be the most important Password Day there has been. With so many of us working from home our...

The Importance of Trust in Cyber Security

Today’s network-dependent organization faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats, and are subject to countless outlets for distribution and sharing. Organizations find themselves balancing...
Holidays Fuel Surge Online Phishing Scams

Holidays Fuel Surge Online Phishing Scams

We’ve all been targeted in phishing attacks — fake messages from a seemingly trusted or reputable source designed to convince you to click on a malicious link, reveal information, give unauthorized...

read more
Least Privilege

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...

The Importance of Trust in Cyber Security

The Importance of Trust in Cyber Security

Today’s network-dependent organization faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats, and are subject to countless outlets for distribution and sharing. Organizations find themselves balancing...