Deconstructing Identity Security
                	Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration...
                     
    
        Read Blog    
    
 
            
		        Post-CircleCI Breach, Focus on Identity Security Strategy
                	When news of the recent CircleCI breach broke, developers everywhere scrambled to rotate tokens and remove hardcoded secrets stored in the popular CI/CD platform to minimize their exposure. Now...
                     
    
        Read Blog    
    
 
            
		        Three Ways to Reinforce Least Privilege with Identity Management
                	The definition of privilege is changing, and this changes everything. Identities of all types — not just IT team members, but any employees — are gaining access to sensitive data, infrastructure...
                     
    
        Read Blog    
    
 
            
		        Identity Security: Bridging the Executive Confidence/Reality Gap
                	In recent years, cybersecurity has become a board-level issue resulting in several executives taking greater responsibility in cybersecurity-related decisions. As a result, the CISO is no longer a...
                     
    
        Read Blog    
    
 
            
		        Why No User Should Have Local Admin Rights
                	The idea of removing local administrator rights from Every. Single. User. across your organization is likely to spark strong reactions. Search popular online forums for the phrase “remove local...
                     
    
        Read Blog    
    
 
            
		        How Identity Security Addresses Key DoD Zero Trust Requirements
                	The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...
                     
    
        Read Blog    
    
 
            
		        CircleCI Breach Exposes Risk of Hard-coded Secrets
                	The recent CircleCI breach highlights the risk of storing secrets in places like private code repositories (GitHub), scripts, configuration files, files encrypted at rest, CI/CD pipeline code or...
                     
    
        Read Blog