
Attestation Is the Solution to the Solution
Great message by US Cybersecurity and Infrastructure Security Agency Director Jen Easterly. In an address to Carnegie Mellon University, she warned that Chinese hackers are
Great message by US Cybersecurity and Infrastructure Security Agency Director Jen Easterly. In an address to Carnegie Mellon University, she warned that Chinese hackers are
SaaS licenses can cost an enterprise a lot of $$$. Figuring out who REALLY needs access to what applications is usually a painful process for
As we look forward into 2023, NIST SP 800-53, PR.AC-1 and user access reviews are a critical identity control for compliance and security audits. This
I would like to wrap up 2022 w/ a few thoughts… Identity Summary of 2022: First of all – identity is the primary source of
In the age of the cloud, strong identity security has become more critical than ever, especially as threat actors increasingly target the cloud–where most new
The news often brings to us word on breaches and hacks – in a usually nicely capsulated package of forensic data concerning the attack vector,
The US CISA (CyberSecurity & Infrastructure Security) agency has posted a series of warning of hacks and threats emanating from Russia based on the recent chaos emanating
If you’re like most organizations, you are either using or considering using Microsoft 365 for its enterprise productivity tools. The question is how to conduct
Azure AD is a go-to solution for companies looking to manage user identities and access privileges in the cloud. The adoption has made Azure AD:
Organizations face many cybersecurity threats, both internal and external. When it comes to maintaining the integrity of sensitive information, organizations must take every possible precaution