Security Market View Three Ways Identity Governance Secures the Oil and Gas Industry According to the federal Energy Information Administration, oil production has been rising steadily since 2009 with the U.S. becoming the world’s leading producer of natural gas. EIA’s preliminary data for 2019 indicates that total U.S. petroleum production averaged about 19.33 million barrels per day (mmb/d). Natural gas is used in a [...] Article RBAC vs ABAC: Definitions and differences - Article RBAC and ABAC’s combined strength is a powerful defense against cyber threats. See the differences between RBAC vs ABAC and how they can be used together. Video SailPoint for Slack SailPoint, the leader in Identity Security, has teamed up with Slack to make requesting and approving access easy, right from within the tool they use most, all while maintaining strict governance and compliance controls. Video SailPoint and Microsoft Azure AD High Risk User Integration Watch this overview of the integration of Microsoft Azure AD and the SailPoint governance platform for high risk user classifications. Infographic Safeguard Critical Applications with Identity Security Safeguarding identities across critical applications and systems in the public sector has taken on a new sense of urgency. Learn how identity security can help. Article What is shadow IT? - Article Learn about the vulnerabilities generated by shadow IT as it expands the attack surface, creating opportunities for cyberattacks and compliance violations. Article Ultimate Guide to Insider Threats in Cyber Security As today’s organizations ramp up their efforts to defend against external cybersecurity threats, the greatest risk actually comes from those inside the company. Article Six cybersecurity risks and how to prepare - Article Learn about cybersecurity risks organizations face and how to address potential threats as cyber criminals devise new ways to compromise the enterprise. Article What is third-party risk management (TPRM)? - Article See how the effort made to ensure effective third-party risk management minimizes unfortunate outcomes and increases efficiency and productivity. Market View Identity Governance in the Time of Coronavirus: Part 2 Of the many lessons CIOs have learned from this global health crisis, is the need to be digitally transformed. It is more critical than ever for organizations to move forward with their digital transformation initiatives. As organizations deal with rapidly deploying business continuity plans, enabling remote workers, quickly provisioning users’ [...] Market View Identity Governance in the Time of Coronavirus: Part 1 In a recent article by Solutions Review, Prediction: The Coronavirus Alters Discourse on Identity Governance and Administration, it discussed how the era of social distancing may increase awareness and deployment of identity governance solutions. As you’ll see, many of the problems that organizations encounter with managing the identities of remote [...] Identity Talk Q&A with CISO Jennifer West on Her Priorities and Building a Collab... When it comes to transforming security teams and building collaborative security cultures, chief information security officer (CISO) Jennifer West has an impressive record. From her current position as CISO and privacy officer at Redlands, Calif. based geographic information systems software provider ESRI, and her crucial roles as CISO at ServiceMaster [...] Market View Identity as ‘business essential’ In my line of work, I talk to a lot of people at companies of different sizes and industries. The vast majority of those people are charging down their digital transformation path with varying degrees of success and maturity. Some started early and are years into the process with most, [...] Market View Australia’s Privacy Awareness Week: Privacy is a Two-Way Street Privacy is an inherent part of being human. To protect our privacy, we build fences around our backyards, but we also have fences to respect our neighbor’s privacy. When thinking about data, we need to think about protecting personal information by building a ‘digital’ fence. This step is critical to [...] «‹ Previous56789Next ›»