[Webinar Recap] The Need for End-to-End Cryptography Management – Keyfactor
I had the wonderful opportunity to participate in a webinar last week with my friend and colleague Ted Shorter from Keyfactor. The topic of the session was the need for end-to-end cryptography lifecycle management in enterprise – and the discussion left a distinct impression on me. I’d like to take ... Read More
Toughen Up Your AD
Request for Comments (RFC) 1823 from August 1995 introduced the Lightweight Directory Access Protocol (LDAP) Application Programming Interface (API). One could argue that this important work served as the foundation for modern identity management. And yet, surprisingly, the word identity does not appear even once in the entire RFC. (The ... Read More
Real Substance on Privileged Access in DevOps and Cloud
If you share a generation with me (which is, uh, old), then you likely will remember those great Wendy’s TV commercials from the mid-80’s. In each of those ads, an elderly actress named Clara was... The post Real Substance on Privileged Access in DevOps and Cloud appeared first on CyberArk ... Read More

