Filter by:

white-papers

The State of Cybersecurity in Utilities

Learn why Identity Security is a necessary component of Cyber Security for the Smart Grid.

07/22/2021

white-papers

Questions are Free: Identity Compromised

Check out SailPoint's Mistaken Identity podcast where we interview VP of Research and Advisory at TAG Cyber about the shifting role of identity.

07/22/2021

white-papers

Ultimate Guide to Insider Threats in Cyber Security

As today’s organizations ramp up their efforts to defend against external cybersecurity threats, the greatest risk actually comes from those inside the company.

07/21/2021

white-papers

Six Cybersecurity Risks and How to Prepare

As the volume of cyberattacks escalates, cybersecurity is now on the radar of most companies. Learn about the top cybersecurity risks and how to prepare.

07/21/2021

white-papers

What are the Different Types of Access Control Systems?

Access control systems control who gets access to what, what are the rules and how are they tracked. Learn about the different models and benefits.

07/21/2021

white-papers

Surviving the SoD (Separation of Duties) Risk Epidemic

Today, every efficient GRC (Governance Risk and Compliance) program includes SoD (separation of duties) to lower the risk of errors or intentional fraud. Learn more.

07/21/2021

white-papers

What is Third-Party Risk?

As the risks posed by third parties continue to grow, companies without a comprehensive strategy for managing third-party risk leave themselves exposed to threats.

07/21/2021

white-papers

What is Data Access Control?

Data access control is a fundamental security tool that enables you to restrict access based on a set of policies. Learn how data access control works.

07/21/2021

white-papers

Identity Security: Three Big Opportunities for Utility Providers

Infrastructure companies like utilities are prime targets for threat actors. Learn about 3 areas of opportunity for creating a smart identity security approach.

07/20/2021

white-papers

What Is the Difference Between Authentication and Authorization?

Authentication and authorization are often used interchangeably but they are separate processes used to protect an organization from cyber-attacks. Learn more.

07/19/2021