Skip to Main Content

The Identity Blog

Create, Communicate, Inspire, Repeat: From Data-Driven PoCs to AI innovations

The abundance of data has made it ever so challenging for IAM professionals to have a bird’s eye view of the underlying risks in [fast-growing, dynamic] enterprise systems. These days companies are taking advantage of machine learning in hopes of gaining meaningful insights from large-scale, high-dimensional data. It should go […]

Uncovering Even More Myths About Identity Governance

Across the globe, technology continues to evolve the face and shape of every organization. This evolution has swept organizations all over the world—big and small—and it’s referred to as a digital transformation. It may sound like the buzzword du jour, but the digital transformation has been and continues to be […]

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Werner Enterprises, founded in 1956 by executive chairman Clarence L. Werner, began with a single truck. Werner went public in 1986 with 630 trucks, and today Werner consists of more than 7,800 tractors, 24,000 trailers, and 13,000 associates and independent contractors across the world. That’s a tremendous amount of growth. […]

The CEO Book Club: Back to Basics

Now and then I like to share what I’m reading. In my past lists, I’ve shared books on business success and building great teams. This time, I’m getting back to basics with some more introspective reads that help with personal growth and performance. Essentialism – Greg McKeown The point of […]

Identity is Security: Privacy Pains

Is there a bounty on privacy? That’s the question we’re exploring following SailPoint CMO Juliette Rizkallah’s latest Forbes article on the rising use of smart technology in our home. From Wi-Fi-connected baby monitors, home security systems and even Alexa—our home and office environments have changed quite a bit from dial-up […]

SCIMing through the Bermuda Triangle

Back in the days of IdentityIQ 7.0 there weren’t a lot of options when it came to implementing a SCIM client and fewer still implementing a SCIM Server. When considering a design the engineering team opted to create two artifacts during deployment, a common piece and a server-side piece. The […]

Identity In A Zero Trust World

We have a concept at SailPoint: identity at the center of security. While that may appear self-gratifying, when you dig a little deeper, you’ll discover why it’s accurate. Zero Trust has been the growing buzzword and theme for the last couple of years in security. At its core, it means […]

Identity is Security: When Data Calls

Are you governing access to your data? That question came into full focus this week as many discovered their data was out in the wild following the discovery of some misconfigured Box accounts. Our CMO Juliette Rizkallah pointed out in SC Magazine that this is just one of many lessons […]

9 Steps to Building an Engineering Security Guild

In our blog, Security in a SaaS Product, we discussed three things: being Aggressive, Impactful, and Evolving. One of the strategies we use to help all three of those principals is our weekly Security Guild meetings. The guild’s task is helping engineering keep security on their minds. We use our […]

Swag, Buzzwords and Women in Security: Conversations at RSA 2019

I was walking down 4th street last week in San Francisco heading toward the Moscone Center for the biggest security conference of the year when I overheard someone say, “My company pays a lot for me to be here to collect swag.” I have been coming to this show for […]