Intelligence-Driven IAM: The Perfect Recipe

Another day, another breach, right? It’s almost like we’ve started to become desensitized to them. But, as a security professional, I want to implore upon you the importance of every single breach – no matter how large or small. They all can cause negative consequences – on the corporation whose share price plummets, or on…

Legacy Approach to Password Management: Trade Security for Convenience?

I came across an article the other day highlighting the importance of password management. The article indicated that employees are willing to sell their passwords to bad actors, and that password management is the right solution to combat this issue. This made me scratch my head – how can password management help mitigate a stolen…

Man@ge y0ur P@ssW0rds!

I received an email from my preferred hotel chain this past weekend encouraging me to change my password. Working in security, this, of course, piqued my interest. What I find really interesting is that what I do at work is spilling over into my personal life and the lives of my friends and family. Everyone…

Connect IGA with PAM to Truly Control All Identities and Access

Organizations today are struggling with managing and governing access. Increasing regulations, a heightened threat landscape, insider threats and an explosion in the number and type of users have all conspired to cause tremendous pressure on IT and Information Security.  At the same time, organizations are expected to grow, generate more revenue and be more productive,…

Not Your Average Cyber Attack

I recently attended an industry conference.  During a break, I chatted with a group of attendees and learned something eye-opening.  The purpose of many cyber attacks is not necessarily to obtain intellectual property, PCI or PII data; many times, it’s to devalue a company by making small changes that impact management decisions and revenue.  Even…

Intelligence Driven IAM

With today’s cyber landscape, it’s essential that organizations take an Intelligence Driven approach to Security.  At RSA, we’ve pioneered this approach.  Intelligence Driven Security is an information security strategy that can help organizations like yours mitigate the risk of operating in a digital world by enabling you to detect, investigate, and respond to advanced threats;…

Unlocking Identity Intelligence

Identity Intelligence is a term you may have heard lately – and it represents the next level of IAM program maturity, for which many organizations are now aiming. Robust identity intelligence can guide the right access decisions across the identity lifecycle, helping to minimize risk and enable compliance with internal guidelines and external regulations. Doesn’t that sound…

How to Embrace Your Organization’s “Identity Crisis”

“Can I use my own tablet?” “Is there an app for that?” “Do I really have to create another user name and password?” “Can I access my company’s network when I work from home?” How often do these questions come up at your organization?  I would bet quite often.  As we all know, the world…

How to Embrace Your Organization’s “Identity Crisis”

“Can I use my own tablet?” “Is there an app for that?” “Do I really have to create another user name and password?” “Can I access my company’s network when I work from home?” How often do these questions come up at your organization?  I would bet quite often.  As we all know, the world…

How to Enable BYOI in 1-2-3

I find myself really interested in users driving changes in security today, especially when it comes to IAM.  You’ve heard the acronyms – BYOI, BYOD.  You’ve heard the term “the consumerization of IT.”  How can you, as a security professional, turn these to your advantage as opposed to something that is forced upon you? Sure,…