It’s no secret that passwords just aren’t very secret these days. Poor password hygiene and an overwhelming volume of digital accounts has influenced far many consumers to routinely reuse passwords across multiple accounts. As you might imagine, businesses have been hearing more and more about credential-stuffing attacks in the news.…
Read More
For companies moving to public or even multicloud environments, key management and encryption — of data in motion, at rest and even in use — are top of mind. Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right. However, there’s more…
Read More
Identity governance and administration (IGA) is a strategic component of identity and access management (IAM). It is designed to help manage digital identities and entitlements across multiple systems and applications. IGA tools are paramount to achieving compliance, as they help ensure that only the right people get access to the…
Read More
Historically speaking, having a plan of attack has gotten a bad rap. Helmuth von Moltke the Elder, who famously said, “No plan survives contact with the enemy,” shared that sentiment with a predecessor in war, Napoleon Bonaparte, who said, “I never had a plan of operations.” Eisenhower warmed up to…
Read More