In the world of Identity and Access Management (IAM), flexibility is the key to stability. While IAMs are not new,…
In an earlier article, we explored the 3 pillars of a Cloud Access Security Broker (CASB), with Identity and Access…
Given the increasing number of cyber-attacks, greater adoption of Cloud Services, and swelling mobile workforce, it’s little wonder that IAM…
An important new practice that has emerged over the past few years in IT management is Bimodal IT, defined by…
With each passing year, newer technologies emerge and companies of all sizes adopt them to keep up the competitive, ever-changing…
[wonderplugin_gallery id=1] “Digital transformation” has been a buzzword well before the COVID-19 pandemic hit. In those pre-COVID times, digital transformation…
[wonderplugin_gallery id=1] Data-driven decision-making (DDDM) is the process of using insights drawn from data to aid the process of decision…
The year 2019 has been a significant one in the technology world, with several high profile cases grabbing headlines. In…
Approximately two billion records were stolen between July and October 2019. That’s just in one quarter of a year! This…
Identity governance and administration (IGA) is the policy-based implementation of user identity and access to ensure security and compliance across…