Skip to content
Filter By
Category
The Challenges of the Chief Information Security Officer (CISO)

The Challenges of the Chief Information Security Officer (CISO)

Top CISO Challenges Recently I took it upon myself to break down the top CISO challenges of 2017. I took to our customers, prospects, and even scoured the internet.

Third Party Risk at the Identity Level

Third Party Risk at the Identity Level

Trusting your vendors is only getting you so far Many companies are placing trust in third parties without a proven means of managing, controlling, and monitoring the access being granted.

Financial Institutions to Focus on Greater Cybersecurity

Financial Institutions to Focus on Greater Cybersecurity

In the wake of perhaps the greatest data breach recorded, it seems the financial services industry needs to up its game and fast.

Financial Services, Third Party Identity Risk, and Equifax

Financial Services, Third Party Identity Risk, and Equifax

The unfortunate reality for companies like Equifax The Equifax data breach opened up serious consequences in the world of business and IT security. The company is receiving lawsuits daily.

Mitigate Third Party Risk, Go beyond just addressing vendor risk, address the entire lifecycle from entity to identity

Mitigate Third Party Risk, Go beyond just addressing vendor risk, address the entire lifecycle from entity to identity

Introduction The age of digital has brought organizations to a whole new way of doing business.

Third Party Identity Management – You Can’t Manage What You Can’t See

Third Party Identity Management – You Can’t Manage What You Can’t See

Have you ever allowed a stranger, perhaps a daycare, to take care of your child? You likely went through a process of calculating and minimizing risk.

EU’s General Data Protection Regulation (GDPR) and 3rd Party Identity Risk

EU’s General Data Protection Regulation (GDPR) and 3rd Party Identity Risk

The EU’s General Data Protection Regulation (GDPR) requires that organizations properly protect their EU customers’ personally identifiable information (PII) and know where every piece of that dat…

SecZetta Looks to Expand Partner Program

SecZetta Looks to Expand Partner Program

Improved reseller and implementation partner program offers dedicated solutions support and training to drive partner success SecZetta today unveiled its expanded Partner Program, offering training …

The Core Connector API

The Core Connector API

Core has recently released the Core Connector API, which once you understand its capabilities, can be a very useful tool.

Third Party Risk

Preventing Breaches with Identity Risk Management

Harnessing Risk Data to Move Past Risk Response Information Security departments spend months developing “defense in depth” strategies to protect their company’s information assets.

Get recent news, helpful resources & upcoming events