Explore Insights

Dive deep into cybersecurity’s hottest trends. Explore the latest insights on global and business challenges, breakthroughs, and emerging technologies in identity management. Find vendor training events, and get technical tips on integration and coding.

Sort Results

Showing 43 - 48 of 239 results
blog icon

Blog

IAM Readiness Solutions: 10 Ways to Achieve Identity Success

Identity is the new attack surface and most IAM programs aren’t ready. This article outlines 10 proven strategies to move from theory to execution, helping CISOs and security leaders align stakeholders, automate identity workflows, and build scalable, breach-ready IAM foundations that actually work.

July 9, 2025

blog icon

Blog

Enhanced Flexibility in PingFederate: Admin API Update for Individual Authn Policies

This article covers a major update in PingFederate's Admin API that allows administrators to update individual authentication policies without replacing the entire policy tree. Previously, updating a single policy required modifying the whole tree, risking unintended consequences. The new API endpoints support targeted creation, retrieval, update, and deletion of policies by ID—offering more precise control, easier debugging, safer customization, and reduced risk of policy conflicts.

June 18, 2025

blog icon

Blog

Rescinded Hire Automation in SailPoint IIQ and ISC

This article explains how to accurately automate the termination of rescinded hires in SailPoint IdentityIQ or Identity Security Cloud when using Workday as the authoritative source. While the IS_RESCINDED attribute in Workday appears useful, it can produce false positives when records are corrected—not truly rescinded. The solution is to combine IS_RESCINDED with additional attributes like FUTURE_DATE and ACTIVE to ensure only valid rescinded hires are terminated, emphasizing the importance of collaboration with HR and environment-specific logic.

June 12, 2025

past-event icon

Past Event

Identiverse 2025 Recap

At Identiverse 2025, our team addressed critical IAM challenges like access sprawl, outdated identity verification, and broken nurse onboarding. Bill Willis emphasized orchestration across systems over adding more tools, while Matt Connors highlighted the need for layered, continuous identity proofing and revealed how delays in nurse onboarding cost the healthcare industry millions. Ben Wise reframed app onboarding as a communication issue, stressing early stakeholder engagement as key to project success.

June 12, 2025

blog icon

Blog

Best Practices for PAM Migration to the Cloud

Migrating Privileged Access Management to the cloud isn’t a lift-and-shift - it’s a strategic opportunity. Our guide covers key planning steps, integration strategies, best practices, and a real-world case study.

May 20, 2025

blog icon

Blog

Breaking the Mold: Women Redefining Cybersecurity, One Identity at a Time

Cybersecurity isn’t just about code - it’s about people. Women in Identity and Access Management are driving progress by blending strategy, empathy, and innovation. From tackling technical challenges to reshaping culture, women in IAM are redefining leadership in cybersecurity.

May 6, 2025