Recent Blog Posts

May 16, 2024
Immediate is Too Late: Modern Incident Response Begins Well Before the Incident
Heightened real-time awareness of identities, accounts, access, entitlements and privilege gives a SIEM tool a chance to understand what just happened. But the critical information for incident response comes from being able to see and understand the history of these identity elements.
Read More...
May 14, 2024
Back to Basics: Identity and Access Management
Identity and access management (IAM) practices encompass several foundational practices to enable business productivity while reducing organizational risk and exposure to cyber threats .
Read More...
May 14, 2024
IAM Foundations: Intro to Authentication and Authorization
Welcome to the world of standards. Don’t complicate it. Implementing a strong foundation for authentication and authorization will ultimately mitigate the largest amount of risk. Once you get past the basics, there are incremental improvements to make but do not try to boil the ocean at the beginning.
Read More...
May 14, 2024
IAM Foundations: Unpacking Identity Threat Detection & Response (ITDR)
In the evolving game of cybersecurity buzzwords comes Identity Threat Detection and Response (ITDR). Despite significant increases in overall IAM spending over the past decade, devastating data breaches continue to impact organizations of all sizes. But the promise of ITDR often fails to meet buyer expectations.
Read More...
May 14, 2024
Exploiting Poor Identity Hygiene: A Cyber Attacker’s Perspective
As a cyberattacker, I thrive in the shadows of the digital world, exploiting the weakest link in the security chain - humans. One of my favorite hunting grounds is poor identity hygiene. Let me explain why.
Read More...
May 14, 2024
The Importance of Discovery & Visibility in Cybersecurity: A Focus on PAM and IGA Implementations
With the proliferation of cloud and on-premises systems, maintaining visibility and control over all assets is a daunting task. This is where discovery tools come into play. These tools provide comprehensive visibility into all identities across all systems, thereby strengthening cybersecurity practices. This blog post delves into the importance of discovery tools, with a specific focus on how it will help continuously monitor and uncover actions you will need to take in Privileged Access Management (PAM) and Identity Governance and Administration (IGA) implementations.
Read More...