Selecting the best GRC tools and platforms - Article
See why organizations increasingly rely on GRC tools to gain control of unwieldy governance, risk, and compliance objectives and bridge gaps between teams.
What is Governance Risk and Compliance (GRC)?
Although GRC has become synonymous with general governance, risk, & compliance activities, there’s more to it than meets the eye. Here’s a deeper look into GRC.
Data security in cloud computing - Article
See how data security in cloud computing should consider both the threats and the complexity of data governance and security models in the cloud.
RBAC vs ABAC: Definitions and differences - Article
RBAC and ABAC’s combined strength is a powerful defense against cyber threats. See the differences between RBAC vs ABAC and how they can be used together.
SailPoint for Slack
SailPoint, the leader in Identity Security, has teamed up with Slack to make requesting and approving access easy, right from within the tool they use most, all while maintaining strict governance and compliance controls.
Best Practices for Infusing Identity Governance into your ServiceNow Imp...
I think that we can all agree that it is more important than ever for organizations to empower their users with the right access, when they need it, where they need it, and of course securely. Those however can be challenging and even conflicting statements. With the overwhelming amount of [...]
SailPoint and Microsoft Azure AD High Risk User Integration
Watch this overview of the integration of Microsoft Azure AD and the SailPoint governance platform for high risk user classifications.
Safeguard Critical Applications with Identity Security
Safeguarding identities across critical applications and systems in the public sector has taken on a new sense of urgency. Learn how identity security can help.
What is shadow IT? - Article
Learn about the vulnerabilities generated by shadow IT as it expands the attack surface, creating opportunities for cyberattacks and compliance violations.
Ultimate Guide to Insider Threats in Cyber Security
As today’s organizations ramp up their efforts to defend against external cybersecurity threats, the greatest risk actually comes from those inside the company.
Six cybersecurity risks and how to prepare - Article
Learn about cybersecurity risks organizations face and how to address potential threats as cyber criminals devise new ways to compromise the enterprise.
Why Cyber Criminals Are Going Back to School
Have you given a thought to your children’s data? If you had a ‘huh?’ moment, hear me out. With so much concern about protecting our identities and personal information, one of the biggest oversights I have found during my time working in the security industry is protecting our children’s school [...]
How to Manage Your Password like a CISO
Over the past decade, we have done the absolute most when it comes to passwords. We have written love letters, pontificated on strategies, and even offered tips on how to teach your mother the tricks of the trade. And it makes sense that we have done so much when it [...]