The Point - The SailPoint Blog

Balancing Zero Trust with a strong identity strategy and AI

The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what the latest breaches show us: three out of 5 organizations expect to be breached. On average, it takes an average of 74 […]

The Step-by-Step Guide to CCPA Compliance

California is just one in a string of many states to enact legislation that puts the responsibility of privacy in the hands of businesses. There are 54 days until the CCPA takes effect, but who’s counting? If you do business in California, then you probably should be.   The CCPA in particular impacts […]

Identity Imperatives for IT Modernization

Chances are, no matter the size of your organization, you’re being challenged to meet shifting expectations of your users. Across industries and geographies, we’ve seen how organizations have used identity to respond to changing trends and stay secure while meeting users’ needs. Read on for top trends in IT modernization […]

IdentityNow Helps Online Retailer Revitalize Its Identity Management Program

Founded just after the pop of the dot-com bubble, this U.S.-based home goods retailer sells more than 14 million household items from thousands of providers. To create an exceptional online shopping experience, the retailer put into place a modern, agile technology stack. “Our product isn’t just a retail operation. Our […]

Answer These Cybersecurity Questions & We Will Tell You If You’re Smarter Than a 5th Grader

Are you smarter than a 5th grader? You might think you are if you know basic math (you know how to multiply two times two) and if you know how to spell Mississippi, but are you smarter than a 10-year-old when it comes to cybersecurity? Many people are unfortunately not […]

What Does Cloud-First and Identity Security Really Mean to Business?

As organizations adopt new technologies and evolve their business protocols through Digital Transformation, what’s the effect on identity and access management (IAM)? In the past, IAM was focused on internal human identities and on-premises applications. Today, it’s also about external identities, including contractors, business partners, clients and the Internet of […]

Back to School: National Cybersecurity Awareness Month Edition

My first cybersecurity memory is working on my Commodore 64 computer with a military-grade type dial-up modem. This was before the Internet and I would use a BBS systems (bulletin board systems) where I would dial in to see and learn about security and hacking topics. This was a time when phone phreaking was all the craze.  It seems like […]

Zero Trust in the Digital Transformation Age

In the digital transformation age, enterprises are shifting from traditional perimeter security approaches to the Zero Trust framework to protect their most sensitive networks. Centered on the belief that organizations should not automatically trust anything inside or outside their perimeters, this model demands that they verify anything and everything trying […]

2019 Market Pulse Survey: If Time is Money, Then Identity Pays

Consider this. You are an IT leader at an enterprise organization. You have not been living under a rock, and therefore are well aware that companies across the world struggle with cybersecurity. Whether its teaching employees how to spot a potential phishing attack or dealing with the fallout from a […]

Observations from SecureWorld Detroit

Just a couple of weeks ago, security professionals, including myself, ascended upon SecureWorld Detroit to hear the latest from top security industry experts.  I also had the great opportunity to be one of these speakers and participate in two-panel sessions – “Building a Better Mouse Trap (Emerging Threats)” and “The […]