Skip to Main Content

The Identity Blog

Q&A with John Masserini, Chief Information Security Officer at Millicom

In this Q&A we spoke with John Masserini, chief information security officer at international telecommunications provider Millicom. Millicom is a leading provider of cable and mobile services in Latin America and Africa under the brand name Tigo. As of the end of 2018, Millicom’s operations employed more than 21,000 employees […]

Identity is Security: Sitting Ducks

If you like to sell your used items on eBay, you may want to read this first. According to Blancco Technology Group, 42% of used drives sold on eBay are holding sensitive data, with 15% containing personally identifiable information. The study analyzed 159 drives purchased in the U.S., U.K., Germany, […]

Passwords, A Love Letter

What makes a good password? We asked a few people what makes the perfect password. Here’s what they said.

4 Articles You Must Read for World Password Day

The Guide to All Things Password Management   Trying to level set on your password management strategy? We have the everything-you-need-to-know guide to managing passwords as part of your overall identity governance strategy in our Identity Library, which you can read here. Check Your Blind Spots World Password Day is […]

Navigate ’19: Q&A with Chief Customer Officer Andrew Kahl

Identity professionals from all over the world will be in Austin, Texas this June for Navigate ’19, SailPoint’s annual identity conference. Navigate is a great opportunity for SailPoint’s customers, prospects, partners and crew members to get in the same room and talk about the identity challenges organizations are facing today. […]

National Bank Readies Itself for the Rise of the Robots

To advance their digital transformation efforts, most enterprises are increasingly turning to robotic process automation (RPA) and software bots to automate any cumbersome and costly manual processes they may still have in place. While the benefits of RPA and software bots are high, they don’t come without potential danger. These […]

Identity is Security: Cyberschool is in Session

We love Fridays, and not just because we love the weekend. It’s also the day that we stop and review all the interesting things that happened in the world of security. This week we saw a lot of development across the pond, as the UK’s National Cyber Security Centre held […]

The Inside Track to a Health Data Breach

Nearly 20 percent of health employees would be willing to sell sensitive health data to unauthorized parties—and on average, for less than $1000. This, according to a 2018 Accenture survey of 912 individuals working in healthcare provider settings or payer organizations.’ Furthermore, the study indicates that respondents from provider organizations […]

An Insurance Provider Consolidates IT for Streamlined & Compliant Access

This organization is one of the top personal property and casualty insurance groups in the United States. Over is its 118-year history, the company has evolved to offer automobile, homeowners and other personal lines of insurance to AAA members through partnerships with AAA clubs in over 23 states. The Pains […]

Identity is Security: The Art of Adaptation

If one thing is certain in cybersecurity, it’s that adaptation is the one thing we must all master. Whether it’s new and evolving threats to the latest compliance requirement, the ability to shape shift to fit whatever challenge is next is so important. In reality, it often feels like this. […]