
YouAttest, A Quick Return on Investment
“Cyber is one of the biggest battlegrounds in the world and probably will be for a century.” — DAVE DEWALT Cybersecurity – A Priority Cybersecurity
“Cyber is one of the biggest battlegrounds in the world and probably will be for a century.” — DAVE DEWALT Cybersecurity – A Priority Cybersecurity
Ransomware, hacks – all around. One of the best practices encouraged is enforce the Principle of Least Privilege (PoLP) – NIST PR.AC-6. But how? Identity Audits and
Zero Standing Privilege and Your IGA Program are co related and come from Zero Standing Privilege which is from Gartner, the analyst firm. The concept
Identity Veracity – the concept of not only does the identity exist – but who manages, what access the identity has and what groups that
Modernize Your IGA ( Identity Governance ), A necessity rather than an luxury. In the last year, the recent pandemic has forced many industries to
When it comes to data, enterprises can no longer assume that traditional identity and access management approaches mean it is safe. Zero Trust security has
NIST and Zero Trust: In light of the recent hack of the Colonial Pipeline – many are turning to the concept of Zero Trust for
YouAttest vs Spreadsheets for Access Reviews – Top 10 Reasons Access Reviews are a crucial part for secure enterprises and for meeting industry required compliances:
Created by Microsoft and first released in 2000, Active Directory (AD) has been used to manage users, devices, and other resources for the last two decades
Had the privilege of doing a well-received podcast w/ rThreat w/ Daniela Applegate as host, titled Strengthening Your IAM Program with IGA. I gladly accepted the invite to talk on