Healthcare has always understood risk. Long before “cyber” entered the vocabulary, clinicians learned to respect infection control, chain of custody, redundancy, and fail-safe..
For years, organizations treated identity like a lock on a door. Authenticate the user, check the box, all’s good, move on. That model made sense when identities were mostly..
When I saw these headlines the first thing I did was look for a credible news source, I didn't find one. The rumor of a $610 billion AI Ponzi scheme didn’t surprise me; these..
The modern network hums with voices you can't see. Not people, machines. Containers, APIs, CI/CD agents, cloud functions, service accounts, scheduled jobs, and AI agents: an..
INSIGHT SERIES 2 of 4 This article is the second chapter of a four-part series. The clock is ticking on legacy IAM. The “old guard” wasn’t built for AI, bots, APIs, or non-human..
INSIGHT SERIES 1 of 4 This article marks the opening chapter of a four-part series on the death of IAM’s so-called “best practices.” For too long, vendors have offered patches and..
As Carol Kane said in Scrooged, "Sometimes you have to slap them in the face just to get their attention!" This blog is a literary slap to get your attention.
IBM’s research lays it bare: it takes 292 days on average to detect a compromised non-human identity (NHI). That’s nearly 10 months, an eternity in the digital battlefield. By..
I often write about the challenges that define cybersecurity today, the relentless push and pull between defenders and attackers, the fragile balance between Identity and Access..
In most boardrooms, when identity security is mentioned, the focus defaults to people, employees, contractors, and customers. But in today’s digital enterprise, the biggest..
Today organizations must come to terms with a stark truth, the perimeter is gone. Old security thinking offers little to no protection in this borderless realm. If you're still..
As digital ecosystems grow increasingly complex, so too do the identities operating within them. No longer confined to human users, identity and access management (IAM) strategies..