Perspectives du marché

How to Manage Your Password like a CISO

Over the past decade, we have done the absolute most when it comes to passwords.We have written love letters,  pontificated on strategies, and even offered tips on how to teach your mother the tricks of the trade. And it makes sense that we have done so much when it comes to our numeric and […]

Équilibrer le Zero Trust avec une stratégie de gestion des identités forte et l’IA

The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what the latest breaches show us. Three out 5 organizations expect to be breached. On average, it takes an average of 74 days […]

Privacy And Regulation: The K-12 Edition

Children have rights to freedom and privacy. Yet, these rights, particularly privacy rights, are often denied by parents who are prone to the “sharenting” phenomenon (the oversharing by parents of their children’s life moments on social media). One must wonder, will the smart world we are building deny children these privacy […]

Mitigating Insider Threats with Privileged Access Governance

Authors: Kelvin Mbatu, Avinash Rajeev, Vivek Tejwani, Radhakrishnan Subramaniyan Enterprises have become increasingly reliant on digital information to meet business objectives, effectively manage operations, and compete in a digitally connected world. The digital ecosystem demands that organizations transform their identity and access management (IAM) programs to protect and monitor critical […]

How to Get Hacked This Holiday Season

Editor’s note: This is satire. SailPoint strongly encourages you to take your cybersecurity very seriously, and if you’re looking for some ways to do that then head over to this blog post. The season of giving and goodwill has arrived once more. Jolly tunes are playing in the distance, department stores are raising their holiday […]

The Importance of Identity in a Hybrid IT World

If your organization is like many, you’re moving more and more applications to the cloud or introducing numerous APIs into your environment as a part your digital transformation. Wherever you are in the various stages of your cloud journey, even if you have a cloud-first mandate, you will find yourself […]

2019 Market Pulse Survey: Good Bot, Bad Bot

There are two sides to every coin. This analogy is especially true when we talk about the ever-present use of software bots in organizations today. On one side of the coin, we can all agree that bots are time-savers. In one case, bots helped this company automate over 100 tasks […]

Favoriser la croissance de l’entreprise et renforcer la sécurité

Les consommateurs exigent l’adoption rapide d’un paysage purement numérique et les identités compromises sont au cœur des défis d’aujourd’hui. Qu’utilisent les auteurs de menaces pour avoir accès à vos données ? Identité. Et, tout comme l’explosion des données, les méthodes des auteurs de menaces sont plus sophistiquées et plus précises que jamais auparavant, […]

Équilibrer le Zero Trust avec une stratégie de gestion des identités forte et l’IA

L’impact des dernières atteintes à la cybersécurité est stupéfiant. Avec des milliards d’identités et de données sensibles compromises, il est clair que la sécurité traditionnelle ne résout pas le problème. Voici ce que les dernières atteintes nous montrent : trois entreprises sur cinq s’attendent à subir une atteinte. De façon générale, il faut en moyenne 74 […]

Le guide complet de la conformité à la CCPA

La Californie n’est qu’un des nombreux États à avoir adopté une loi qui confie la responsabilité de la protection de la vie privée aux entreprises. Il reste 54 jours avant l’entrée en vigueur de la CCPA, mais qui tient les comptes ? Si vous faites des affaires en Californie, vous devriez.   La CCPA a notamment des répercussions sur […]