Perspectives du marché

Security for the Next Generation: Call for Volunteers!

Two weeks ago, I made the annual trek to the RSA Conference in San Francisco, the mother of all security shows. There’s no better place to get a one-week immersion in all things security and to meet with some of the best and brightest minds in our industry. One of […]

A New Year, An Old Risk … A Revitalized Resolution

An article by Mathew Schwartz of InformationWeek, “Hackers, Insiders Behind Most Identity Theft,” caught my attention this week – not because it highlights a new risk for organizations, but because it illustrates the old adage, “the more things change, the more they stay the same.” The article recaps a study […]

2010 Market Pulse Survey: Moral Grey Area Exposes Companies to Data Theft

SailPoint recently announced the results of our 2010 Market Pulse Survey focused on employees’ attitudes toward company data. We got some pretty startling results from the more than 1,500 workers polled in the U.S. and Great Britain: Half of the respondents said they would take company data with them when […]

Don’t Underestimate the Risk of Privileged Users

A few weeks ago, I was out on the West Coast talking to companies about privileged user management and identity governance with our technology partner, Cyber-Ark. This is an area of real concern for lots of organizations – and rightfully so. During our meetings, we exchanged real-world “horror stories” about […]

Report: Compliance Drives Security Budgets

I read a very interesting Forrester report last week commissioned by Microsoft and RSA. It was based on a survey of 305 IT security decision makers and assesses data security practices at enterprises around the world. A key takeaway from the report is the fact that compliance, not security, drives […]

Feet on the Street: RSA Highlights Cloud and Cybersecurity

This week, several members of the SailPoint team made the annual trek to the industry’s biggest security event, the RSA Conference. As always, the conference was a high-paced mix of conference sessions, technology debates, and meetings with customers and partners. I’m always interested in what themes get the most play […]

Achieving Auditable Compliance with NERC CIP Reliability Standards

Beginning in 2010, energy producers and distributors face a looming challenge – to become “auditably compliant” with the Critical Infrastructure Protection (CIP) standards by the July 1, 2010 deadline. Developed by NERC, an independent, not-for-profit organization whose mission is to ensure the reliability of the bulk power system in North […]

Market Pulse Survey: Divide Between Business and IT Persists

We recently conducted our third Market Pulse Survey, which focused on the key drivers of access certifications and how organizations ensure their access privileges align with business policy. According to the 150 respondents, including many readers of this blog, there is clear evidence business users involved in these processes don’t […]

U.S. Data Security Laws: Is There Another SOX in your Future?

A recent Forbes feature, “The Year of the Mega Breach,” caught my attention last week. It includes a slideshow of 2009’s largest security breaches, and concludes that this year alone, more personal information was exposed through data breaches than ever before. The article appeared amid news about a T-Mobile data […]

Counting Down to the New Model Audit Rule

In less than three months, the new Model Audit Rule (MAR) will go into effect. Beginning January 1st, many non-public insurers will for the first time be required to comply with more stringent regulatory provisions, and public insurers that are already subject to SOX will be subject to additional reporting […]