Sharing our
IAM Expert Knowledge

Top 3 Cybersecurity Threats in 2021

The threat landscape is constantly shifting in cyber security, one must constantly be aware of the new and emerging vulnerabilities and attack vectors that bad actors are using. In this post we’ll cover our top 3 threats currently affecting industries.  […]

Identity Access Management and COVID-19: Is Your Company Staying Secure?

In the wake of the COVID-19 pandemic, many companies have been left with no choice but to reinvent themselves digitally. To survive and grow, businesses who are newly remote must sharpen their focus on cybersecurity and reinforce existing infrastructure to meet immediate risks. […]

Blockchain Series Part 1: Understanding the History and Basics

Blockchain technology is rapidly transforming many industries with the advanced security and data verifiability that it allows. But for many, blockchain technology seems like a black box. The goal of this series of blog posts about blockchain technology is to highlight its applicability in an identity and access management context, the problems it addresses, and the new paradigm it creates. […]

Past Articles

8 Trends shaping the future of Identity and Access Management

Identity and Access Management (IAM) has always been a critical technology for the enterprise.  Yet COVID-19 somehow made it even more essential as businesses sought to support distributed work and cloud adoption in the face of an increasingly sophisticated threat landscape.  As the world continues to embrace digital transformation, the

Embracing zero trust cybersecurity: A checklist to get you started

The early days of network security were defined by static, nigh-immutable perimeters. Every user and asset inside that perimeter was treated with implicit trust. This worked well enough in a world where in-office work was the norm and cybercriminals operated largely independently of one another. How things have changed. We

A day in the life at Indigo: Benji Bien Aime

Benji Bien Aime Identity and Access Management Senior Developer   I was one of the first interns at Indigo three years ago. Previously, I worked for a few large enterprises but wanted to pivot to a smaller company to experience the difference first-hand. Although I was by no means an

Infographic: Key components of agile development

Download our infographic to learn more about the Key Components of Agile Development Agile development is composed of several critical components found throughout the overall process. Download our infographic to learn more about the Key Components of Agile Development. download now Interested in learning more about Agile Development for IAM

Identity Access Management with agile development

Identity Access Management (IAM) is a framework for managing processes, policies, and access levels for digital identities throughout the organization. Modern businesses use a variety of applications and services throughout their organization — gone are the days of simply managing Active Directory permissions. Instead, IAM empowers organizations to more effectively

Effective Compliance
Starts with the
Right Governance Processes

Book Your Discovery Call Today with One of Our Governance Risk & Compliance Experts