
The $1.9M Artificial Intelligence Advantage for CISOs
What’s more expensive than a data breach? A data breach without artificial intelligence. For years, the narrative around cybersecurity has…

Analysis of a Malicious IDE Plugin and a $500,000 Theft: Lessons for Development Teams
In software development, a single action, such as an “install” click, can have significant security implications. In April, SDG issued…

When AI Acts Alone: The Identity Crisis No One’s Talking About
Autonomous AI agents now operate in finance, healthcare, technology, and government, executing tasks with increasing independence and authority. These agents…

Uncover Hidden Value in Microsoft Licenses: Reduce Spend, Elevate Security
Microsoft licensing now makes up a significant portion of enterprise software spend. Yet many organizations continue to operate with a…

Shaping the Future: How Women Leaders and Generative AI Are Rewriting the Rules of Tech
As Director of Risk, Compliance, and Information Security at SDG Corporation, Meetali oversees corporate governance and GRC practices across global…

Out of the Shadows: Securing the Rise of Non-Human Identities
They don’t clock in, take vacations, or fill out HR forms—but non-human identities (NHIs) are everywhere in your digital environment….

HIPAA Crackdown: How Credential Stuffing Is Becoming a Multi-Million Dollar Mistake
Credential stuffing is an automated attack where threat actors use stolen username-password pairs from previous breaches to gain unauthorized access…

Human Oversight in a GenAI World: Leading the Future, Responsibly
Generative AI is reshaping how organizations operate, empowering teams with tools that enhance creativity, efficiency, and scalability. Yet, amidst rapid…

Why Identity Threats in Healthcare Are Escalating—and How IAM Can Stop Them [Guest Blog]
Author: Spencer Crane, Vice President of Product, ID Dataweb As someone who has helped healthcare organizations strengthen their security posture,…

SEC 2025 Examination Priorities: Cybersecurity and Operational Resilience
The U.S. Securities and Exchange Commission (SEC) has placed cybersecurity and operational resilience at the forefront of its 2025 examination…

A New Approach to Critical Identity Management Challenges: Decentralized Identity
Identity is arguably one of the most critical aspects of a security infrastructure. Identity controls access to most interactions with…

Breaking Down the Components of Identity Security Posture Management to Protect Digital Identities
Identity Security Posture Management, or ISPM, provides organizations with a mechanism to manage and monitor security systems. As identity continues…

AI Hedge Fund Fraud: SEC Crackdown and the Compliance Mandate for Investment Firms
SEC Targets AI Misrepresentation The Department of Justice (DOJ) recently secured a guilty plea from Mina Tadrus, founder of Tadrus…

Navigating Challenges in Passwordless Implementation
As organizations transition to passwordless authentication, they unlock numerous security and operational benefits. However, implementing this technology comes with its…

Third-Party Risk Management in Banking: Lessons from the Capital One Incident
Financial institutions historically and increasingly rely on third-party vendors for essential services making robust Third-Party Risk Management (TPRM) programs a…

Healthcare Cybersecurity in 2025: Navigating Rising Threats, AI Risks, and Regulatory Changes
As healthcare enters 2025, the industry faces an escalating cybersecurity crisis. Cyberattacks are becoming more frequent and sophisticated, preying on…

Cybersecurity 2024 – Lessons and Insights for a Resilient New Year

Understanding TunnelVision – A VPN Evasive Attack

Navigating the Florida Data Privacy Rights: A Guide to the FL DBR
The Florida Digital Bill of Rights (FL DBR) brings data privacy to Florida residents, while presenting fresh challenges for businesses…

IAM and Hedge Funds: A Proactive Approach to Data Security

Navigating the Transition to ISO 27001:2022 – A Strategic Approach for Enhanced Information Security
The latest revision of ISO 27001, released on October 25, 2022, introduces several changes that aim to address evolving security…

Navigating the Cybersecurity Landscape in 2024: Regulatory Changes and Strategic Adaptations
The cybersecurity domain is witnessing a new wave of transformation akin to the early 2000s/SOX era, once again driven by…

Navigating the Cloud: A 2024 Outlook on Cloud Computing
As we step into the next chapter of technological evolution, the role of cloud computing continues to expand and redefine…

Surgical Approach to Selecting a SASE Provider
Choosing Your Cybersecurity Team: A Surgical Approach to Selecting a SASE Provider The Art of Surgically Precise Cybersecurity In the…

Identity Data Fabric for Enhanced Security and a Competitive Advantage
The sprawl of information across multiple repositories has complicated managing identity data. The addition of an Identity Data Fabric enables…

A Preventative Approach to Achieving Compliance in Healthcare
The healthcare sector is ensnared in a relentless vortex of risk and regulation amid unanticipated disruptions and transformations. Navigating through…

Vishing: Protecting Your Organization from Voice-Driven Attacks
Vishing, a blend of voice and phishing attacks that traditionally targeted consumers to compromise their financial accounts, is now an…

DevSecOps Enablement: Key Principles and Best Practices 
Development, Security, and Operations (DevSecOps) enablement is the process of integrating security practices into the Development and Operations (DevOps) workflow….

Why You Might Be Closer to Achieving Zero Trust Than You Think
Enterprises across the globe are fast-pacing zero trust initiatives as compliance regulations stiffen, government mandates are enforced, and advanced cyberattacks…

Using an Identity Data Fabric to Extend Artificial Intelligence (AI)
This article will cover integrating an Identity Data Fabric with AI to gather insights into your user data. Additionally, it…

Achieving Accelerated Maturity of Your Identity Governance Program
Navigating Business Transformation with Intelligent Automation Enterprises across the globe are facing fast-paced business transformations, and the COVID-19 pandemic has…

