Learn nine reasons identity governance and administration demonstrate how you can bring consistency, compliance and streamlined provisioning to user access.
The news recently broke: Okta was breached earlier this year and it potentially affected several hundred of their corporate customers. Though Okta is one of our competitors in the Identity and Access Management (IAM) world, we are not celebrating t…
The main difference between Zero Trust and defense-in-depth security strategies is that Zero Trust never implicitly trusts users inside or outside network perimeters.
Co-authored by Alan Radford from One Identity and Stuart Sharp from OneLogin
Organizations are under constant pressure to boost productivity and cut costs. To handle repetitive, mundane and time-consuming tasks and processes, companies are turning to…
On January 26, the U.S. White House Office of Management and Budget (OMB) issued a memorandum on advancing security measures to dramatically reduce the risk of successful cyberattacks against the federal government. The memo states that organizations…
The principle of least privilege is the cybersecurity model that users should have only the bare minimum of privileges to data and resources needed to perform their job.
What is an attack surface and what best practices can help to minimize it? Cyberattacks and data breaches are incredibly expensive and can cause customers to lose confidence in a business. It’s in every organization’s best interest t...
So, here we are again. It is the end of another year where our world has been turned upside-down by none less than Mother Nature herself. Whilst the advances in medicine and the vaccination programme have helped us tremendously, we find o...
Zero Trust – a cybersecurity concept focused on eliminating vulnerable permissions and unnecessary/excessive access to an organization’s critical assets – isn’t a new idea. It was developed by Forrester Research more tha...