CATEGORIES

News

The impact that the pandemic had on Identity and Access Management (IAM) in the enterprise

According to a study based on an online survey of over 500 IT decision makers released by IDSA, over the last year, the shift to remote work has led to an increase in the number of identities, an increased focus on identity security, but a decrease in confidence in...

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...

Happy World Password Day! (and why you should care)

Today is World Password Day. Every year on the first Thursday in May World Password Day promotes better password habits. Despite what is going on in the world this might be the most important Password Day there has been. With so many of us working from home our...
The Importance of Trust in Cyber Security

The Importance of Trust in Cyber Security

Today’s network-dependent organization faces an array of challenges and threats. Information and its critical role manifest in many different ways and formats, and are subject to countless outlets...

read more
Most common Security Vulnerabilities

Most common Security Vulnerabilities

Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. The move to remote-first has underlined the increasing reliance on cloud and web technologies while...

read more
Least Privilege

Least Privilege

The 2020 Global State of Least Privilege Report shows that two-thirds of organizations now consider the implementation of least privilege a top priority in achieving a zero-trust security model. Below, we take a look at some of the critical drivers for the adoption of...

IAM trends shaping the future of security

IAM trends shaping the future of security

Imagine this scenario – If you are the CEO of a mid-sized organization with branches in different continents and three thousand employees, how efficiently could you monitor logins?Perhaps, on a bad day, an employee would have lost their Smartphone or lost the paper in...