The History, Evolution and Opportunity: System for Cross Identity Management (SCIM) Server Technologies

The History and Evolution Development on the System for Cross Identity Management (SCIM) specifications has been an ongoing effort with contributions from industry experts across every aspect of security. Originally, SCIM technology was created to…

The Power of Integrating Privileged Access Security and Identity Governance

Privileged access across the enterprise continues to increase exponentially, and it’s not hard to see why. Interconnectivity, cloud and mobile-first strategies have enabled a distributed enterprise, in which more people work from home, on the…

Federal Cybersecurity Report Finds Majority of Agencies at Risk

As a number of crippling breaches have illustrated, federal government agencies and departments are frequent targets in today’s advanced attacks. The White House’s Office of Management and Budget (OMB), in partnership with the Department of…

Is It Time for a Cyber Hygiene Check Up?

The National Institute of Standards and Technology (NIST) recently released version 1.1 of its CyberSecurity Framework, which incorporates feedback received from public comments and workshops over the past two years. Though the document is chiefly designed to help…