How to Implement an Insider Threat Management Program

Organizations have long been implementing processes to safeguard against outside and inside cybersecurity risks. While many companies focus on dividing the risks into intentional and unintentional, one area of risk that seems to fall outside of this formula is orphaned accounts – the result ... The post How to Implement an Insider Threat Management Program appeared first on SecZetta ... Read More

Twitter Breaches, MFAs, and the Need for Identity Proofing

National Cybersecurity Awareness Month (NCAM) was initially launched in October of 2003 through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA).  Together, they have been ... The post Twitter Breaches, MFAs, and the Need for Identity Proofing appeared first on SecZetta ... Read More
Interview with an Expert Series, Paul DeGraaff

Interview with an Expert Series, Paul DeGraaff

Common Gaps in Managing Third-Party Identity Risk In this episode of Interview with an Expert we gain insight into the gaps that most companies have with third-party identity risk, why ... The post Interview with an Expert Series, Paul DeGraaff appeared first on SecZetta ... Read More