Overview
Explore
Labs
Services
Partners
Select a tab
21 results found
Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!
This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023
The Importance of Modernizing Active Directory
In the realm of enterprise IT, Active Directory (AD) has long been the go-to identity platform for managing access, identities and security policies. As the digital landscape evolves, so too do the complexity and demands placed on AD. Modernization is not just about keeping pace with technological advancements, but ensuring the backbone of enterprise IT infrastructure remains robust, flexible and secure.
Blog
•Jul 22, 2024
Understanding Cisco ISE 3.x and the Benefits of Migrating from ISE 2.x to 3.x
Cisco Identity Services Engine (ISE) 3.x represents a significant upgrade over its predecessor, Cisco ISE 2.x, offering a host of new features, improved performance and enhanced security capabilities. This blog post delves into the key features of Cisco ISE 3.x and highlights the benefits of migrating from earlier versions, providing a thorough understanding of why this upgrade is essential for modern network environments.
Blog
•May 6, 2025
Scattered Spider and the Insurance Industry
Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025
IAM as a GRC Enabler: The Security Consultant's Perspective
Identity and access management (IAM) is transforming governance, risk and compliance (GRC) by enhancing security, operational efficiency and regulatory adherence. Can your organization prove its access integrity?
Blog
•Apr 4, 2025
Importance of Identity Security: The Core of Modern Cybersecurity
As cyber threats become more sophisticated, organizations increasingly realize that securing their digital identities are no longer just an IT priority - it's a critical business necessity. During my attendance at two leading Identity and Access Management (IAM) conferences, (Okta's Oktane and SailPoint's Navigate), it was clear that Identity Security sits at the core of modern security strategies.
Blog
•Jan 2, 2025
Configuring Omnissa Access as an IDP in Island Enterprise Browser
Integrating Omnissa Access as an Identity Provider (IDP) with Island Enterprise Browser creates a seamless, secure access experience. This strategic alignment enhances Zero Trust security, enabling granular control and risk-aware access. Organizations benefit from streamlined onboarding, reduced risk and improved productivity for a secure, efficient digital workspace for all users.
Blog
•Apr 24, 2025
The Trojan Within: A Modern Halloween Tale of Identity
Not all ghosts haunt from the shadows. This Halloween, follow Jack O'Lantern, a remote contractor with a hidden identity, and see how AI-generated personas can bypass onboarding. Learn why verifying who enters your organization is more important than ever
Blog
•Oct 28, 2025
Securing the AI Landscape with Palo Alto Networks' AI Security Posture Management (AI-SPM)
Generative AI is revolutionizing industries but introduces new security challenges. Palo Alto Networks' AI Security Posture Management (AI-SPM) offers comprehensive protection for visibility, control and governance across AI applications. Secure your AI journey with AI-SPM, preventing data leaks, misconfigurations and compliance violations while fostering innovation.
Blog
•Apr 3, 2025
RSA Conference 2022 Recap
Four WWT security experts share their key takeaways from RSAC 2022.
Blog
•Jun 14, 2022
The Grizzled CyberVet: State of Network Security
Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025