Skip to Main Content

Market Views

Watch: The New Frontiers of Identity

Our world is always evolving, and organizations are racing to keep up. Digital transformation is increasing the complexity enterprises are managing, and while it’s opened new avenues to success, it’s also created new frontiers for identity governance that must be addressed. Watch the video below and learn today about the […]

The Machine Behind Identity Governance

Cybersecurity isn’t possible without full visibility. That basic fact is the dominant goal of effective risk management and it is, of course, what identity governance is all about: seeing clearly into the complex activity of human and nonhuman actors throughout an organization and implementing appropriate controls to ensure the right […]

Identity is Security: Hacking is in the Air

Love may have been in the air this week, but hackers managed to find a way to hack that this Valentine’s Day. In perhaps the most perfectly-timed cyberattack, OKCupid was found to have been hit with a credential stuffing attack. And then just a couple of days later, a major […]

Mistaken Identity: My DNA, My Malware

It’s hard enough to separate the malicious actors from the valid users in today’s environments without also having to separate humans from the malware itself. Mistaken Identity’s David Lee and Mike Kiser explore the coming reality in which exploits are hard-coded into the DNA of humans. Also discussed – the […]

Identity is Security: Breaking Records

Someday, we may start seeing cybersecurity news headlines that say “least amount of breaches ever” and “ people are using the most secure passwords ever,” but today is not that day. We learned this week that Australia saw record breaking breach numbers the last quarter of 2018. Not only that, but […]

Productivity: Time To Do More

The connection between identity governance and productivity might not be immediately apparent. But once you start thinking of all the processes tied to identity and access—provisioning and deprovisioning employees or contractors, for example, or managing password resets—the amount of time wasted in mundane tasks becomes all too apparent. Increasing productivity […]

Street Magician Reveals ‘Intelligent’ Lessons for Cybersecurity

You’ve seen this act before. A famous street magician stops an unexpecting passerby and asks the individual to participate in a magic trick. The magician places a playing card in each of the participant’s hands. He grabs the participant’s wrists and waves it back and forth—promising that the cards will […]

Mistaken Identity: The 57 Million Dollar Question

The phrase, “probably worth a google” takes on a whole new shade of meaning as Mistaken Identity explores the fourth fine levied under GDPR. Google was fined $57 million for inadequate user consent by a French data privacy agency. Is this the “big one” that people have been waiting for […]

Identity is Security: Collecting Data

Some people collect snow globes. Others collect trophies. And some collect data breaches. All eyes are focused on the big collection of 2.2 billion unique usernames and passwords that was recently discovered making its way around the internet. We often look at these major breaches in retrospect and wonder how we could […]

Cyber Today: Governing Identity

Almost half of data breaches today involve lapses in access privileges. Think about the sheer number of events that occur every minute around user access—human and non-human, in-office and remote, across a landscape of partners and vendors—and the immense challenge of identity governance becomes crystal clear. A Forbes Insights/SailPoint survey […]