Blog

Our top industry experts weigh in on topics that could affect you and your organization

  • Sound Security Architecture is the Key to Digital Identity Assurance

    Posted on February 1, 2017 by Seth Art

    The weakest link in the identity chain is no longer authentication; it has moved!

    The identity chain has many links (Identify, Provision, Authenticate, Federate, Manage, De-Provision), and for years the reliance on passwords has made authentication the weakest link. The use of passwords for user authentication is often the one piece of the cyber security system whose creation and safety is left in the hands its users; rather than being entrusted to its designer and administrators. Learn More

  • Six Steps to an Effective Incident Response Exercise

    Posted on September 2, 2016 by Mark Coderre

    Incident Response drills shouldn’t be viewed as overhead, or a discretionary spend, because a poorly executed response to a cyber security incident translates to material financial, regulatory, and reputational costs for your organization.

    Effective incident response requires preparation; this includes not only preventing incidents, by ensuring that systems are secure, but also establishing an incident response capability so that you’re confident your organization is ready to respond. Learn More

  • Unlock Your Cloud Potential by Consolidating Your Directory Infrastructure

    Posted on June 2, 2016 by Sally Guenette

    Enterprise technology infrastructure, application development and software services are moving to the Cloud. Cloud adoption involves integrating Identity and Access Management (IAM) systems with Cloud Single-Sign-On (SSO) solutions for federations and cloud-based security controls. Learn More