Sharing our
IAM Expert Knowledge
Top 3 Cybersecurity Threats in 2021
The threat landscape is constantly shifting in cyber security, one must constantly be aware of the new and emerging vulnerabilities and attack vectors that bad actors are using. In this post we’ll cover our top 3 threats currently affecting industries. […]
Identity Access Management and COVID-19: Is Your Company Staying Secure?
Blockchain Series Part 1: Understanding the History and Basics
Past Articles
8 Trends shaping the future of Identity and Access Management
Identity and Access Management (IAM) has always been a critical technology for the enterprise. Yet COVID-19 somehow made it even more essential as businesses sought to support distributed work and cloud adoption in the face of an increasingly sophisticated threat landscape. As the world continues to embrace digital transformation, the
Embracing zero trust cybersecurity: A checklist to get you started
The early days of network security were defined by static, nigh-immutable perimeters. Every user and asset inside that perimeter was treated with implicit trust. This worked well enough in a world where in-office work was the norm and cybercriminals operated largely independently of one another. How things have changed. We
Identity and Access Management (IAM) 101: Key terms, strategies, technologies, and more
The rise of cloud computing, the prevalence of mobile devices, and ever-evolving compliance requirements creates the need for a better way to manage employee and customer access to systems and software. Identity and Access Management (IAM) has stepped up to meet that need. IAM creates a systematic approach to administering
A day in the life at Indigo: Benji Bien Aime
Benji Bien Aime Identity and Access Management Senior Developer I was one of the first interns at Indigo three years ago. Previously, I worked for a few large enterprises but wanted to pivot to a smaller company to experience the difference first-hand. Although I was by no means an
Infographic: Key components of agile development
Download our infographic to learn more about the Key Components of Agile Development Agile development is composed of several critical components found throughout the overall process. Download our infographic to learn more about the Key Components of Agile Development. download now Interested in learning more about Agile Development for IAM
Identity Access Management with agile development
Identity Access Management (IAM) is a framework for managing processes, policies, and access levels for digital identities throughout the organization. Modern businesses use a variety of applications and services throughout their organization — gone are the days of simply managing Active Directory permissions. Instead, IAM empowers organizations to more effectively
Effective Compliance
Starts with the
Right Governance Processes
Book Your Discovery Call Today with One of Our Governance Risk & Compliance Experts