Using risk to align IAM with business objectives
Why alignment matters It is easy to see how an IAM initiative relates to your organization’s process, data and technology needs. However, the connection between your IAM program’s direction and your organization’s overarching business objectives can be more difficult to spot. Don’t let that fool you — aligning IAM and [...]
How to Manage Your Password like a CISO
Over the past decade, we have done the absolute most when it comes to passwords. We have written love letters, pontificated on strategies, and even offered tips on how to teach your mother the tricks of the trade. And it makes sense that we have done so much when it [...]
View from Mark
Leading A Business When Privacy Is (Almost) Dead
Privacy is almost dead. And truth be told, it’s by our own doing. Thanks to the “selfie culture” that exists today, our privacy appears to be headed for six feet under. The modern lifestyle is rife with oversharing of every single detail of our days, and this isn’t just a [...]
Enable Business Growth and Strengthen Security
Consumers are demanding rapid adoption of a purely digital landscape, and at the center of today’s challenges are compromised identities. What do threat actors use to gain access to your data? Identity. And, like the explosion of data, threat actors’ methods are more sophisticated and precise than ever before, making [...]
6 Big Mistakes that Exposes Research Data
How do you protect access to patient data that multiplies in size and is saved across disparate locations across your organisation?
How NIST Enables Higher Ed to Ace Cybersecurity Challenges
Higher education institutions must ensure access to applications and files is appropriate at all times to avoid breaches and regulatory non-compliance fines.
Health Data Security Made Affordable through Cloud Identity
Preventing a data breach has always been an uphill climb. But is the hill getting steeper?
SailPoint – Okta Integration Demonstration Video
See how SailPoint seamlessly integrates with Okta to give you the power to see and control access for everyone to everything across your organization.
Securing Identity Does Not Stop with Strong Authentication
The Importance of a Complete Identity and Access Management Strategy, Rooted in Governance
Identity From the Cloud: Is IDaaS Right For You?
Cloud computing is here to stay and is changing how IT and business users alike are thinking about how we deploy, implement and consume technology across the enterprise. We have seen a continuous wave of traditional software tools moving to SaaS models, as vendors have begun to address the various requirements of enterprise-level SaaS.
EU Guide: Employing Governance for Risk Mitigation and Compliance
EU IT decision makers, 64% believe attacks on their own companies have increased over the past year.
Securing Unstructured Data in Mergers & Acquisitions
During the merger, from preapproval to post-convergence, you need the right solution to keep your sensitive data secure.
When Identity Meets Data
Data. It’s the foundation for business in the modern world, and the lifeblood of every organization regardless of its business or location. In today’s connected world, data exists in many places: in data centers, on corporate desktop systems, in email and even on users’ personal mobile devices. Data allows us [...]