Identity Fusion Corporate Blogs & Articles
INSIGHT SERIES 4 of 4 Legacy IAM is now the weakest link in the enterprise chain. The “users” in your systems aren’t human at all, they’re APIs, bots, service accounts and the..
INSIGHT SERIES 3 of 4 This article is the third chapter in our four-part series on the end of legacy IAM and the rise of IAM 3.0. The cracks in the old platform fortress are no..
INSIGHT SERIES 2 of 4 This article is the second chapter of a four-part series. The clock is ticking on legacy IAM. The “old guard” wasn’t built for AI, bots, APIs, or non-human..
INSIGHT SERIES 1 of 4 This article marks the opening chapter of a four-part series on the death of IAM’s so-called “best practices.” For too long, vendors have offered patches and..
As Carol Kane said in Scrooged, "Sometimes you have to slap them in the face just to get their attention!" This blog is a literary slap to get your attention.
IBM’s research lays it bare: it takes 292 days on average to detect a compromised non-human identity (NHI). That’s nearly 10 months, an eternity in the digital battlefield. By..
I often write about the challenges that define cybersecurity today, the relentless push and pull between defenders and attackers, the fragile balance between Identity and Access..
In most boardrooms, when identity security is mentioned, the focus defaults to people, employees, contractors, and customers. But in today’s digital enterprise, the biggest..
In surfing, there’s a place known as the impact zone—that stretch of water just beyond the calm, where the waves crash with force and fury. It’s where the action happens, the..
Today organizations must come to terms with a stark truth, the perimeter is gone. Old security thinking offers little to no protection in this borderless realm. If you're still..
One of the most consistently challenging aspects of our work as a consulting agency is the onboarding process with new clients. It’s rarely the paperwork or compliance training..
There’s an old saying: “The best time to plant a tree was twenty years ago. The second best time is today.” When it comes to Identity and Access Management (IAM), we no longer..