
The Hacks and Identity Access Reviews
One can not avoid the slew or reports of the hacks – from Colonial Pipeline to the all the victims known and unknown from the

The Identity Audit and Security Problem
of Siloed Applications
Nothing is more important than conducting proper audits to ensure an organization’s data security and compliance. However, conducting effective audits is easier said than done

Preparing for your IPO Needs to Include Identity Governance for your SOX Audit
It’s an exciting time when an organization prepares for its IPO, but that excitement shouldn’t distract from the necessary regulations that we must comply with.

The Role of a vCISO and Identity Governance
On Wednesday, October 27th, YouAttest is hosting a live webinar event titled: “The vCISO and Identity Governance.” The event will feature special guest Paul Horn,

Why User Access Controls Should be the First Priority in Cybersecurity
What is User Access Control? User Access control is at the heart of cybersecurity and it is integrated into our everyday life. User access control regulates who has what access, and when they

What is The Access Control Domain of the D.O.D.’s CMMC?
What is The Access Control Domain of the D.O.D.’s CMMC? Previously, we discussed the practices and procedures established for Department of Defense (DoD) contractors, constructed

The Differences in the DODs CMMC (Cyber Security Model Certification) Levels
DODs CMMC (Cyber Security Model Certification) Levels, What are they? This blog will denote the differences in the DODs CMMC (Cyber Security Model Certification) Levels. In response

Is IT Compliance Helping or Hurting Against Hacks?
An odd blog for a founder and CEO of a compliance company – but there it is. We all know that hacking is at an

YouAttest, A Quick Return on Investment
“Cyber is one of the biggest battlegrounds in the world and probably will be for a century.” — DAVE DEWALT Cybersecurity – A Priority Cybersecurity

IGA on Your Okta Tenant – Advantage YouAttest
IGA on Your Okta Tenant – Advantage YouAttest Okta is an amazing IAM/CIAM/2FA product – the gartner leader, and the customer favorite. It changed the

Reimagine PAM with YouAttest Identity Triggers
Hackers try to take over admin accounts. But often they can’t obtain the admin accounts or are blocked by segmentation or 2FA. Thus they resort

What is State-in-Time and How Is It Used in a Change Review Audit?
Ransomware, hacks – all around. One of the best practices encouraged is enforce the Principle of Least Privilege (PoLP) – NIST PR.AC-6. But how? Identity Audits and