}

Blog

Read more about the latest developments on Identity Governance & Administration

6 Things You Can do to Prevent Breaches

If You’re Havin’ Data Problems, We Feel Bad For You 99 Problems and a Breach Ain’t One When it comes to data breaches and hacking, Hollywood has conditioned us to envision the most ambitious targets of international mega-corporations’ intellectual property, government intelligence, or massive theft from financial institutions. But your school district has some pretty important Personally Identifiable Information (PII) stored for students and staff– and it likely requires less to access than Tom Cruise suspended from the server-room ceiling.

Read more

Your data sucks

I have worked with the user-related data of well over 100 organizations in my last 5 years as an Identity Management consultant. Without exception or reservation, it has all been garbage in one way or another (sometimes in multiple ways).

Read more

Part 3: Mitigating the risk of internal breach

In parts 1 and 2 of this blog series, we outlined how access governance, single sign-on and automated provisioning ensure that users have accurate permissions and access within an organizations hybrid IT environment, both on premise and in the cloud. Today, I want to focus on cleaning up file shares to ensure the aforementioned solutions have a clean slate from which to operate. If you think about it akin to cleaning a room, you would pick clothes off the floor before vacuuming it, right? Similarly, you should clean up your file system before allocating resources in to securing it.

Read more