Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and…
Browsing CategoryAccess Governance
How to Create Identity and Access Governance In and Across Clouds
In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at…
Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority
Many companies around the world with industrial operations environments, commonly referred to as operational technology (OT) environments, do not invest the same resources to protect OT systems as they do…
Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints
In many cases, one business unit sets up its own cloud-native identity and access management controls differently from another. One of your customers’ business units may need Red Hat, while…
Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies
Almost everyone at this point has heard about the European Union’s (EU) General Data Protection Regulation (GDPR). You’ve probably received an email from a company that you have shopped with…
How Authentication and Identification Work Together to Build Digital Trust
The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.” In today’s digital world, trust can be a tricky concept.…
Can Authentication Negatively Impact the User Experience?
Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving your customers’ trust in your services is often key to…
Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade
While sitting in metaphysics class one afternoon, I asked my philosophy professor if Frankenstein’s monster is really a monster if he is just the sum of other people’s parts. He…
What Is Conditional Access, and Why Does It Matter to You?
Implementing conditional access procedures is a crucial part of a zero-trust strategy. But its fair to ask yourself, isn’t access always conditional? Isn’t access to systems and data always granted…
How to Get Business Users to Buy Into Your Identity and Access Management (IAM) Strategy
Allow me to shed some light on one of the critical organizational aspects of identity and access management (IAM) that we come across often when delivering IAM consulting services to…