Crypto-Agility, Machine Identities, and the Urgency of Now: My Takeaways from the London Gartner IAM Conference

This week, I attended my first Gartner IAM Summit in London as the new Chief Revenue Officer at AppViewX. I’ve spent much of my career in ITOps and cybersecurity — leading GTM ...

Key Takeaways from the 2024 ESG Report on Non-Human Identity (NHI) Management

For years, Identity and Access Management (IAM) has centered on human identities, built on the assumption that people are the weakest link in the cybersecurity chain. However, the digital landscape has shifted ...
The Impending Identity Crisis Of Machines: Why We Need To Secure All Non-Human Identities, From Genai To Microservices And IOT

The Impending Identity Crisis Of Machines: Why We Need To Secure All Non-Human Identities, From Genai To Microservices And IOT

The digital landscape is no longer solely populated by human actors. Lurking beneath the surface is a silent legion – non-human or machine identities . These non-human identities encompass computers, mobile devices, ...
Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Here it is – everything you need to know about using Entra ID’s Conditional Access policies to boost your identity security posture. Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud-based ...

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
Admin Impersonation Demo Video (IdP/SSO)

5 Signs of an Identity Attack

Identity attacks are increasing and putting organizations' data at risk. Look out for these 5 warning signs of an identity attack: stale accounts, user impersonation, lateral movement... The post 5 Signs of ...
image

5 Security Leaders Weigh in on Securing Identity and Access in 2023

Security leaders discuss the challenges and priorities for identity and access security in 2023, including the transition to the cloud, the need for visibility and control over identities... The post 5 Security ...

Product Update Release Announcement for New REST API Framework and Webhooks 

Today, Authomize announced that we have released an updated version of our REST API framework to enable our customers to connect Authomize’s Cloud Identity and Access Security Platform throughout their environments.  The ...