The Identity Catechism: Fifteen questions every CISO should ask about their Identity program

The evolution is underway. Our infrastructures are borderless, our critical data is cloud based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy controls are as outdated as the conceptual hardened perimeter and our users are still human; and will still succumb to the (not so) well


A Perspective From The Outside

Being someone who’s spent the better part of his InfoSec career in the greater NYC area, one tends to become acutely aware of the millions of people who surround them walking the city streets. Much like the scene in Cryptonomicon, when our protagonist Lawrence Waterhouse used the up-and-down motion of people walking the streets of