Three Ways Identity Governance Secures the Oil and Gas Industry
According to the federal Energy Information Administration, oil production has been rising steadily since 2009 with the U.S. becoming the world’s leading producer of natural gas. EIA’s preliminary data for 2019 indicates that total U.S. petroleum production averaged about 19.33 million barrels per day (mmb/d). Natural gas is used in a [...]
RBAC vs ABAC: Definitions and differences - Article
RBAC and ABAC’s combined strength is a powerful defense against cyber threats. See the differences between RBAC vs ABAC and how they can be used together.
SailPoint for Slack
SailPoint, the leader in Identity Security, has teamed up with Slack to make requesting and approving access easy, right from within the tool they use most, all while maintaining strict governance and compliance controls.
SailPoint and Microsoft Azure AD High Risk User Integration
Watch this overview of the integration of Microsoft Azure AD and the SailPoint governance platform for high risk user classifications.
Safeguard Critical Applications with Identity Security
Safeguarding identities across critical applications and systems in the public sector has taken on a new sense of urgency. Learn how identity security can help.
What is shadow IT? - Article
Learn about the vulnerabilities generated by shadow IT as it expands the attack surface, creating opportunities for cyberattacks and compliance violations.
Ultimate Guide to Insider Threats in Cyber Security
As today’s organizations ramp up their efforts to defend against external cybersecurity threats, the greatest risk actually comes from those inside the company.
Six cybersecurity risks and how to prepare - Article
Learn about cybersecurity risks organizations face and how to address potential threats as cyber criminals devise new ways to compromise the enterprise.
What is third-party risk management (TPRM)? - Article
See how the effort made to ensure effective third-party risk management minimizes unfortunate outcomes and increases efficiency and productivity.
Identity Governance in the Time of Coronavirus: Part 2
Of the many lessons CIOs have learned from this global health crisis, is the need to be digitally transformed. It is more critical than ever for organizations to move forward with their digital transformation initiatives. As organizations deal with rapidly deploying business continuity plans, enabling remote workers, quickly provisioning users’ [...]
Identity Governance in the Time of Coronavirus: Part 1
In a recent article by Solutions Review, Prediction: The Coronavirus Alters Discourse on Identity Governance and Administration, it discussed how the era of social distancing may increase awareness and deployment of identity governance solutions. As you’ll see, many of the problems that organizations encounter with managing the identities of remote [...]
Q&A with CISO Jennifer West on Her Priorities and Building a Collab...
When it comes to transforming security teams and building collaborative security cultures, chief information security officer (CISO) Jennifer West has an impressive record. From her current position as CISO and privacy officer at Redlands, Calif. based geographic information systems software provider ESRI, and her crucial roles as CISO at ServiceMaster [...]
Identity as ‘business essential’
In my line of work, I talk to a lot of people at companies of different sizes and industries. The vast majority of those people are charging down their digital transformation path with varying degrees of success and maturity. Some started early and are years into the process with most, [...]
Australia’s Privacy Awareness Week: Privacy is a Two-Way Street
Privacy is an inherent part of being human. To protect our privacy, we build fences around our backyards, but we also have fences to respect our neighbor’s privacy. When thinking about data, we need to think about protecting personal information by building a ‘digital’ fence. This step is critical to [...]