Identity
4 Tips to Start an Identity Governance Program
Identity is the new buzzword in cybersecurity, and for a good reason. Identity governance and identity access management (IAM) programs shift the security focus from networks and devices to people. The reality is that behind every task, threat or attack is a person. Organizations are challenged with managing identity, proper access and acceptable use of…
Read MoreThe Right Way to Create an IAM Strategy and Roadmap
Today’s blog is brought to you by our partner Integral Partners. Republished from Integral Partners Insights Recently we shared some reasons why every company needs an identity and access management (IAM) roadmap, and what motivates companies to seek help in developing their IAM plans. But what does this process entail, what are the results, and what’s distinctive about the…
Read MoreHow to Prevent Privileged User Account Breaches
Today’s Blog is brought to you by Ryan Conley, an Account Executive at Brite Computers. Most big breaches over the past 2 years can be tied back to mismanaged privileged account credentials. In the Target breach, someone had gained access to a privileged account through their HVAC contractor. Home Depot fell prey to a similar attack when a hacker used a person’s username and password to gain access to the network…
Read More