While sitting in metaphysics class one afternoon, I asked my philosophy professor if Frankenstein’s monster is really a monster if he is just the sum of other people’s parts. He gave no reply to this question, only laughed. This memory struck me when I was thinking about a topic that…
Read More
Your organization has invested in dozens of cybersecurity tools. But you’re not sure if they’re working as expected. For example, what percentage of successfully blocked attacks reported by your security information and event management (SIEM) tool are false reports, where the attack actually occurred but was reported as blocked? Zero…
Read More
Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted on the condition that, at a minimum, users enter a username and password? True enough. But the term “conditional access”…
Read More
Allow me to shed some light on one of the critical organizational aspects of identity and access management (IAM) that we come across often when delivering IAM consulting services to our customers: Organizations that fail to address the quality of content for IAM processes may struggle to gain the acceptance…
Read More