Implementing a Zero Trust framework: identity and access management (IAM)
Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Usernames and passwords have become the first line of defense for modern information security practices, which is why IAM is so important. This first line of defense is under increasing attack as organizations take advantage of more Software as a […]
7 months ago October 28, 2021
2 min read
The dangers of shadow IT
Unapproved apps, devices, and cloud services have long been the bane of IT professionals. Remote and hybrid work arrangements that have grown in popularity during the COVID-19 pandemic have only made these “shadow IT” services more of a problem. But, just as hybrid work environments aren’t going away any time soon, neither are the threats […]
8 months ago October 14, 2021
6 min read
