Why Common IAM Solutions for Identity-based Attacks Aren’t Really Working
This article was released as a whitepaper for VeriClouds on May 2, 2020, co-authored with Stan Bounev, CEO at VeriClouds, to address common solutions that …
CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router
This article was released as a whitepaper for VeriClouds on May 2, 2020, co-authored with Stan Bounev, CEO at VeriClouds, to address common solutions that …
The following article was written for and published here on the TrustLogix blog series pages in March 2022. I’m syndicating this here as the contents …
As you may have noticed if we’ve been connected for a while, I’ve finally gotten back around to getting my long-neglected personal site up and …
Syndicated from Security Boulevard, published May 6, 2021. Let’s face it — everyone pretty much hates passwords. While many industry titans are making significant and …
The following article was written for Secure360.org as part of the information presented in an hour-long presentation I gave in Minneapolis entitled Data, Identity & …
As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into …
In keeping with the fact individuals and enterprises are seeing and experiencing a lot more occurrences of ransomware, I’m also seeing a lot of articles …
Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage …
(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party …
(Originally published on LinkedIn – January 13th, 2016) I am a firm believer that knowing the background and history of things provides a much better …