
Micro-Segmentation in the Real World – A Zero Trust Story
A guest blog, by Milton Keath, of Guardicore: With the details of the hacks like Colonial Pipeline coming out we are seeing the need for dialogue on new
A guest blog, by Milton Keath, of Guardicore: With the details of the hacks like Colonial Pipeline coming out we are seeing the need for dialogue on new
When it comes to data, enterprises can no longer assume that traditional identity and access management approaches mean it is safe. Zero Trust security has
NIST and Zero Trust: In light of the recent hack of the Colonial Pipeline – many are turning to the concept of Zero Trust for
YouAttest vs Spreadsheets for Access Reviews – Top 10 Reasons Access Reviews are a crucial part for secure enterprises and for meeting industry required compliances:
Created by Microsoft and first released in 2000, Active Directory (AD) has been used to manage users, devices, and other resources for the last two decades
Had the privilege of doing a well-received podcast w/ rThreat w/ Daniela Applegate as host, titled Strengthening Your IAM Program with IGA. I gladly accepted the invite to talk on
Completing the identity governance lifecycle for audits, YouAttest has added User Access Requests/Approvals to its portfolio of solutions for Okta customers. To where we
Many of todays attacks can be explained from understanding privilege escalation and the cyber kill chain. Derived from a military model, the Cyber Kill Chain
Every day, cyberattacks and data breaches affect organizations around the world. Thousands of tools have been deviced to detect and mitigate these attacks. This is
Developed by the American Institute of Certified Public Accountants (AICPA), Service Organization Control (SOC) reports are independent reports designed to establish a framework for the system-level controls