
What is State-in-Time and How Is It Used in a Change Review Audit?
Ransomware, hacks – all around. One of the best practices encouraged is enforce the Principle of Least Privilege (PoLP) – NIST PR.AC-6. But how? Identity Audits and
Ransomware, hacks – all around. One of the best practices encouraged is enforce the Principle of Least Privilege (PoLP) – NIST PR.AC-6. But how? Identity Audits and
Zero Standing Privilege and Your IGA Program are co related and come from Zero Standing Privilege which is from Gartner, the analyst firm. The concept
Identity Veracity – the concept of not only does the identity exist – but who manages, what access the identity has and what groups that
Modernize Your IGA ( Identity Governance ), A necessity rather than an luxury. In the last year, the recent pandemic has forced many industries to
A guest blog, by Milton Keath, of Guardicore: With the details of the hacks like Colonial Pipeline coming out we are seeing the need for dialogue on new
NIST and Zero Trust: In light of the recent hack of the Colonial Pipeline – many are turning to the concept of Zero Trust for
YouAttest vs Spreadsheets for Access Reviews – Top 10 Reasons Access Reviews are a crucial part for secure enterprises and for meeting industry required compliances:
Created by Microsoft and first released in 2000, Active Directory (AD) has been used to manage users, devices, and other resources for the last two decades
Had the privilege of doing a well-received podcast w/ rThreat w/ Daniela Applegate as host, titled Strengthening Your IAM Program with IGA. I gladly accepted the invite to talk on
Completing the identity governance lifecycle for audits, YouAttest has added User Access Requests/Approvals to its portfolio of solutions for Okta customers. To where we