Automation in Mainframe Access: The journey continues
In my first post I discussed the fact that enterprises have been opting to save time and reduce errors... View Article
In my first post I discussed the fact that enterprises have been opting to save time and reduce errors... View Article
When you see this term, SoD, with a little O, what does it mean? It can mean two things... View Article
Much of the attention in the industry is focussed on privileged account management and identity governance rather than the... View Article
In today’s complex world of heritage and bleeding edge systems, identity and access management is pretty much mandatory for... View Article
Value Measurement In part I, we covered the framework that we’ll use as the basis of calculating the value... View Article
I went back and forth over this title versus, “The Internet of Measuring Thingies,” but neither seemed to communicate... View Article
Identity governance is important, right? Everyone agrees, but how can you measure its value? It looks daunting, but all... View Article
Reach for the beach – but watch out for the breach. This recent post highlighted that as the temperature... View Article
In this blog, I talked about “whaling”—a refined kind of phishing attack in which hackers use spoofed or similar-sounding... View Article
The “between a rock and a hard place” discussion at this year’s RSA Security Conference was the battle between... View Article