
What is CCM and Access Governance?
Every day, cyberattacks and data breaches affect organizations around the world. Thousands of tools have been deviced to detect and mitigate these attacks. This is
Every day, cyberattacks and data breaches affect organizations around the world. Thousands of tools have been deviced to detect and mitigate these attacks. This is
Developed by the American Institute of Certified Public Accountants (AICPA), Service Organization Control (SOC) reports are independent reports designed to establish a framework for the system-level controls
Hackers get into our systems for data theft and other reasons. The Cyber Kill Chain identifies privilege escalation as a key step, right after exploitation and before
Health was on everyone’s mind in 2020 – which means a lot of passing of medical records! The need for portability isn’t waning – so
In January of 2020, the US Department of Defense (DoD) released the highly anticipated Cybersecurity Maturity Model Certification (CMMC) to improve cybersecurity measures that contractors must have
In the world of weekly headline data breaches and majore new privacy regulations such as CCPA, CCPR and GDRP – a question is: Who
SolarWinds and Key Administrative Groups The SolarWinds attack has reminded us that it often comes down to who has access to our PAM (Privilege Management
Everyone is moving their apps, infrastructure and services to the cloud – but what does moving to the cloud mean for your access reviews? For
One of the key parts of any IAM/IGA program has to be recognize that ghost accounts are a serious threat. Thorough and regularly scheduled access
For any organization, maintaining strict information security is an essential part of cybersecurity – following best practices for user access reviews are a big part