Recent Blog Posts

July 19, 2024
Unlocking Security: The Vital Role of Multi-Factor Authentication (MFA) for All Identities Everywhere
While we wait to learn more about the root cause of the breach at AT&T, a familiar theme is emerging in the wake of these attacks: basic security practices are not being implemented and enforced.
Read More...
June 10, 2024
Immediate is Too Late: Modern Incident Response Begins Well Before the Incident
Heightened real-time awareness of identities, accounts, access, entitlements and privilege gives a SIEM tool a chance to understand what just happened.
Read More...
July 19, 2024
United Healthcare Attack Underscores Importance of Foundational Identity Hygiene
The high-profile United Healthcare attack underscores how continuous enforcement of the basics of identity hygiene can be exceptionally complex, especially in large hybrid organizations with remote workforces and legacy systems.
Read More...
June 10, 2024
Back to Basics: Identity and Access Management
Identity and access management (IAM) practices encompass several foundational practices to enable business productivity while reducing organizational risk and exposure to cyber threats .
Read More...
June 10, 2024
IAM Foundations: Intro to Authentication and Authorization
Welcome to the world of standards. Don’t complicate it. Implementing a strong foundation for authentication and authorization will ultimately mitigate the largest amount of risk. Once you get past the basics, there are incremental improvements to make but do not try to boil the ocean at the beginning.
Read More...
June 10, 2024
IAM Foundations: Unpacking Identity Threat Detection & Response (ITDR)
In the evolving game of cybersecurity buzzwords comes Identity Threat Detection and Response (ITDR). Despite significant increases in overall IAM spending over the past decade, devastating data breaches continue to impact organizations of all sizes. But the promise of ITDR often fails to meet buyer expectations.
Read More...
July 19, 2024
Exploiting Poor Identity Hygiene: A Cyber Attacker’s Perspective
As a cyberattacker, I thrive in the shadows of the digital world, exploiting the weakest link in the security chain - humans. One of my favorite hunting grounds is poor identity hygiene. Let me explain why.
Read More...