Skip to content
Filter By
Category
Mitigate Third Party Risk, Go beyond just addressing vendor risk, address the entire lifecycle from entity to identity

Mitigate Third Party Risk, Go beyond just addressing vendor risk, address the entire lifecycle from entity to identity

Introduction The age of digital has brought organizations to a whole new way of doing business.

Third Party Identity Management – You Can’t Manage What You Can’t See

Third Party Identity Management – You Can’t Manage What You Can’t See

Have you ever allowed a stranger, perhaps a daycare, to take care of your child? You likely went through a process of calculating and minimizing risk.

EU’s General Data Protection Regulation (GDPR) and 3rd Party Identity Risk

EU’s General Data Protection Regulation (GDPR) and 3rd Party Identity Risk

The EU’s General Data Protection Regulation (GDPR) requires that organizations properly protect their EU customers’ personally identifiable information (PII) and know where every piece of that dat…

SecZetta Looks to Expand Partner Program

SecZetta Looks to Expand Partner Program

Improved reseller and implementation partner program offers dedicated solutions support and training to drive partner success SecZetta today unveiled its expanded Partner Program, offering training …

The Core Connector API

The Core Connector API

Core has recently released the Core Connector API, which once you understand its capabilities, can be a very useful tool.

Third Party Risk

Preventing Breaches with Identity Risk Management

Harnessing Risk Data to Move Past Risk Response Information Security departments spend months developing “defense in depth” strategies to protect their company’s information assets.

The Mismanaged Identity Lifecycle of Third Parties

The Mismanaged Identity Lifecycle of Third Parties

Why are Third Party Identities Mismanaged? Today, most organizations rely on contract workers, vendors and other third party employees to move their business forward.

What’s Your Strategy for Third Party Identity Risk?

What’s Your Strategy for Third Party Identity Risk?

Third Party Risk As more companies rely on outside partnering, third party identity risk management becomes more important as a layer of defense to protect sensitive corporate data from the threats po…

Third Party, Non-Employees: The Role of HR and IT Security is Merging

Third Party, Non-Employees: The Role of HR and IT Security is Merging

A data security breach… it’s a nightmare proposition for any corporation and a reality not too unrealistic for many.

Third Party Identity Blog Series – Part 3: “Have it Your Way!”

Third Party Identity Blog Series – Part 3: “Have it Your Way!”

Requirements: What You Want, What You Need, What You Can Get Implementing a non-employee management solution starts with identifying solution requirements.

Get recent news, helpful resources & upcoming events