Don’t Stop Risk Distancing. Remote Work Is Here to Stay

Don’t Stop Risk Distancing. Remote Work Is Here to Stay

A Look Back: The Sprint to Remote Work Created Security Gaps The global shift to remote work happened fast: millions of employees went home last March and adjusted to new ways of working – thanks ... Read More
Why Desktop MFA is Essential to your Endpoint Security

Why Desktop MFA is Essential to your Endpoint Security

An employee’s work laptop can be a treasure trove for any malicious actor who can get access to it. Think about it. Many of the apps you use on your laptop don’t ask you for credentials, especially if your organization doesn’t have strong multi-factor ... Read More
work from home

Are Current Work From Home Security Measures Enough?

|
The COVID-19 pandemic has turned working from home from a perk to an everyday reality. These changes are permanent, and they require a new security perspective. The chaos of the first few months of the COVID-19 pandemic required swift decision making and abrupt, earth-shaking changes to everything from the workplace ... Read More
Are Current Work From Home Security Measures Enough?

Are Current Work From Home Security Measures Enough?

The COVID-19 pandemic has turned working from home from a perk to an everyday reality. These changes are permanent, and they require a new security perspective. The chaos of the first few months of the ... Read More
Grow Up! Plotting Your Path Along the Zero Trust Maturity Model

Grow Up! Plotting Your Path Along the Zero Trust Maturity Model

From the philosophy behind it, to the technology that powers it, at Idaptive we’ve talked about Zero Trust a lot (see the list of the entire Zero Trust blog series at the bottom of this post). That’s a good ... Read More
Zero Trust 12

Grow Up! Plotting Your Path Along the Zero Trust Maturity Model

|
Better security is as easy as these six steps to adopting Zero Trust. From the philosophy behind it, to the technology that powers it, at Idaptive we’ve talked about Zero Trust a lot (see the list of the entire Zero Trust blog series at the bottom of this post). That’s ... Read More
Friction-Free Experience vs Secure Access: Lessons From the “Zoombombing” Fallout

Friction-Free Experience vs Secure Access: Lessons From the “Zoombombing” Fallout

The controversy and fallout resulting from the widespread reporting of bad actors gaining access to Zoom meetings is just another example of the constant struggle faced by developers and designers of how to balance a ... Read More
zoombombing

Friction-Free Experience vs. Secure Access: Lessons From the “Zoombombing” Fallout

|
The controversy and fallout resulting from the widespread reporting of bad actors gaining access to Zoom meetings is just another example of the constant struggle faced by developers and designers of how to balance a friction-free experience and ensuring secure access and privacy. In the last few weeks, everyone has ... Read More
“Should I Stay or Should I Go?” Artificial Intelligence (And The Clash) has the Answer to Your Employee Access Dilemma.

“Should I Stay or Should I Go?” Artificial Intelligence (And The Clash) has the Answer to Your Employee Access Dilemma.

What happens when employees have access to data, apps or services that they shouldn’t? Best case scenario: they might know the salaries of all their colleagues and company execs. Worst case scenario: malicious actors exploit ... Read More
zero trust 11

“Should I Stay or Should I Go?” Artificial Intelligence (And The Clash) has the Answer to Your Employee Access Dilemma.

|
Take a lesson from The Clash’s hit song and make “If I go there will be trouble, and if I stay it will be double,” your mantra when it comes to managing employees’ access. Modern machine learning and user-based analytics can transform how you intelligently limit access for employees, especially ... Read More
Loading...