
Is IT Compliance Helping or Hurting Against Hacks?
An odd blog for a founder and CEO of a compliance company – but there it is. We all know that hacking is at an
An odd blog for a founder and CEO of a compliance company – but there it is. We all know that hacking is at an
IGA on Your Okta Tenant – Advantage YouAttest Okta is an amazing IAM/CIAM/2FA product – the gartner leader, and the customer favorite. It changed the
Hackers try to take over admin accounts. But often they can’t obtain the admin accounts or are blocked by segmentation or 2FA. Thus they resort
Identity Veracity – the concept of not only does the identity exist – but who manages, what access the identity has and what groups that
How much time does an Identity Audit take? Whether they’re done yearly, semiannually, or quarterly, enterprises are required to conduct IT audits. During the audit, the IT
Developed by the American Institute of Certified Public Accountants (AICPA), Service Organization Control (SOC) reports are independent reports designed to establish a framework for the system-level controls