[Webinar Recap] The Need for End-to-End Cryptography Management – Keyfactor

|
I had the wonderful opportunity to participate in a webinar last week with my friend and colleague Ted Shorter from Keyfactor. The topic of the session was the need for end-to-end cryptography lifecycle management in enterprise – and the discussion left a distinct impression on me. I’d like to take ... Read More

Toughen Up Your AD

Request for Comments (RFC) 1823 from August 1995 introduced the Lightweight Directory Access Protocol (LDAP) Application Programming Interface (API). One could argue that this important work served as the foundation for modern identity management. And yet, surprisingly, the word identity does not appear even once in the entire RFC. (The ... Read More

Real Substance on Privileged Access in DevOps and Cloud

| | DEVOPS, Reports
If you share a generation with me (which is, uh, old), then you likely will remember those great Wendy’s TV commercials from the mid-80’s. In each of those ads, an elderly actress named Clara was... The post Real Substance on Privileged Access in DevOps and Cloud appeared first on CyberArk ... Read More