Our Blog

Think, Share & Learn

With the rise of phishing-resistant tools like passkeys, securing accounts with Multi-Factor Authentication (MFA) is more effective than ever. However, cybercriminals are targeting the weakest link –...

Today marks the official rollout of our new integration with AWS. This is the latest integration this year, hot on the tail of our announcements around GitHub and Salesforce. Our goal remains the...

Identity threats are evolving, and staying a step ahead is paramount. 

Last week, I saw a post from Richard Bird, Chief Security Officer at Traceable. It was simple, effective, and perfectly crystalized some recent thoughts on identity security. He wrote, “ITDR is the...

Are you tired of relying on SIEMs and still failing to generate valuable insights from your data? Concerned about the increasing costs of your SIEM? Are you looking to understand how to get...

The term “zero trust” was first coined in 2009 by John Kindervag. It’s a “trust but verify” approach that is related to defense-in-depth strategies and the principle of least privilege. In...

Last week, we wrote a blog on the takedown of Genesis Market and the implications for session hijacking going forward. In this blog, we’ll explore session hijacking in more depth and provide...

Identity Security Posture Management (ISPM) is an essential aspect of an identity security program that enables organizations to manage and protect their identities proactively. It involves...