Skip to content
Filter By
Category
The Core Connector API

The Core Connector API

Core has recently released the Core Connector API, which once you understand its capabilities, can be a very useful tool.

Preventing Breaches with Identity Risk Management

Preventing Breaches with Identity Risk Management

Harnessing Risk Data to Move Past Risk Response Information Security departments spend months developing “defense in depth” strategies to protect their company’s information assets.

The Mismanagement of Third Parties

The Mismanagement of Third Parties

Why are Third Party Identities Mismanaged? Today, most organizations rely on contract workers, vendors and other third party employees to move their business forward.

What’s Your Strategy for Third Party Identity Risk?

What’s Your Strategy for Third Party Identity Risk?

Third Party Risk As more companies rely on outside partnering, third party identity risk management becomes more important as a layer of defense to protect sensitive corporate data from the threats po…

Third Party, Non-Employees: The Role of HR and IT Security is Merging

Third Party, Non-Employees: The Role of HR and IT Security is Merging

A data security breach… it’s a nightmare proposition for any corporation and a reality not too unrealistic for many.

Third Party Identity Blog Series – Part 3: “Have it Your Way!”

Third Party Identity Blog Series – Part 3: “Have it Your Way!”

Requirements: What You Want, What You Need, What You Can Get Implementing a non-employee management solution starts with identifying solution requirements.

Identity Relationship Management Mitigates Identity Risk

Identity Relationship Management Mitigates Identity Risk

Everything has an Identity This seems like a simple statement, but frankly it’s a concept that is often overlooked.

Third Party Identity Blog Series – Part 2: How to Tackle the Problem

Third Party Identity Blog Series – Part 2: How to Tackle the Problem

The Life-Cycle Hotel: Non-Employees Check-In, but They Don’t Check-Out Most companies have put attention into onboarding non-employees.

Third Party Risk – The Weakest Link

Third Party Risk – The Weakest Link

Forbes magazine recently published an article talking about 10 security myths that need to be busted. The third myth jumped right out at us at SecZetta, “Protecting yourself is good enough.

Third Party Identity Blog Series – Part 1: Realizing the Identity Problem

Third Party Identity Blog Series – Part 1: Realizing the Identity Problem

Who Has Keys to Your House? If your company is like most, possibly 20% to 35% of people with access to your physical and/or logical assets are 3rd parties/non-employees.

Get recent news, helpful resources & upcoming events