
Updated Guidance from NIST on “Implementing the HIPAA Security Rule”
Since the passage of the Health Insurance Portability and Accountability Act (HIPAA) in 1996, healthcare organizations have been required to protect the privacy and security

YouAttest Enterprise Edition – The Right Release at the Right Time
The Ponemon Institute states that 86% of enterprises have an immature IAM deployment – and the majority of these are enterprises that lack a robust

Getting Started on Your IGA program
An identity, governance, and administration (IGA) program is critical to managing risks associated with user access to information and systems. IGA provides a structure for

The Evolution of Identity and Access
For over 20 years, there has been a trend to consolidate enterprise identities as a single store of record. Many cite the introduction of Sun’s

Palo Alto’s “Why IAM is a Target” Report and Identity Governance
Organizations of all sizes are increasingly moving their operations to the cloud, prioritizing identity and access management (IAM). As a result, IAM systems are becoming

Q&A: Why YouAttest IGA for JumpCloud Open Directory Platform?
YouAttest is partnering with JumpCloud to extend YouAttest’s rapidly deployed identity governance solution to the JumpCloud open directory platform. YouAttest is excited to partner with

Time for a YouAttest Identity Pen Test
The US CISA (CyberSecurity & Infrastructure Security) agency has posted a series of warning of hacks and threats emanating from Russia based on the recent chaos emanating

Access Reviews for Microsoft 365 for Security and Compliance
If you’re like most organizations, you are either using or considering using Microsoft 365 for its enterprise productivity tools. The question is how to conduct

Azure AD: A Key Identity Store for Compliance
Azure AD is a go-to solution for companies looking to manage user identities and access privileges in the cloud. The adoption has made Azure AD:

The Need for Access Reviews for Azure AD
Azure AD is the dominant identity store for enterprises under compliance: SOX, SOC2, HIPAA/HITRUST, ISO 27001 and others – and thus the need for access

Do Access Reviews Mitigate the Risk of Privilege Creep?
Organizations face many cybersecurity threats, both internal and external. When it comes to maintaining the integrity of sensitive information, organizations must take every possible precaution

New Era – Identity Theft to Identity Fraud
In 2021, we saw the end of the era of identity theft and the beginning of the next: the era of identity fraud. According to