Identity Governance Blog

A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom

Identity Governance Blog

How Modern IGA Helps Address CISA Advisory on Weak Security Controls and Practices
How Modern IGA Helps Address CISA Advisory on Weak Security Controls and Practices

Read about the most used attack methods cyber actors use to gain an initial foothold and the mitigations suggested by cybersecurity authorities.

Learn more 3 min read
Learn more
4 Key Lessons for Managing Orphaned Accounts, Learned from Oliver Twist
4 Key Lessons for Managing Orphaned Accounts, Learned from Oliver Twist

By re-examining perhaps the most famous orphan in literature, there is a lot to be learned about how to approach orphaned accounts through a modern approach to Identity Governance and Administration.

Learn more 4 min read
Learn more
Separating Church and State: Why SoD is so Important in IGA
Separating Church and State: Why SoD is so Important in IGA

This type of scenario, where certain combinations of access leads to massive downside, is easily applicable to how organizations today govern and administer identity access and entitlements.

Learn more 3 min read
Learn more
Identity Management Day: Better Together
Identity Management Day: Better Together

The second annual Identity Management Day is a day for awareness and education for business leaders, IT decision makers, and the general public about the importance of managing and securing digital identities.

Learn more 3 min read
Learn more
Stuck Between a Rock and a Hard Place
Stuck Between a Rock and a Hard Place

Business, IT, and security leaders all face a growing pile of requirements that they need to adhere to in order to optimize business operations, while maintaining security rigor, and meeting an increasingly complex compliance landscape.

Learn more 3 min read
Learn more
3 Steps to Mitigate Risk from Insider Threats
3 Steps to Mitigate Risk from Insider Threats

Identity governance controls that every organization should have in place to help mitigate risk that is inherently posed from insider access.

Learn more 3 min read
Learn more
Hitting the Campaign Trail: 4 Tips for Certification Campaigns
Hitting the Campaign Trail: 4 Tips for Certification Campaigns

Access certification campaigns are a way for organizations to audit entitlements and formally validate that identities’ access rights are appropriate. Here are 4 tips for building successful certification campaigns.

Learn more 3 min read
Learn more
Combatting Ransomware. Part 2: Identity Governance as the Foundation
Combatting Ransomware. Part 2: Identity Governance as the Foundation

In part 2 of our blog series on ransomware, we talk about ways in which identity governance can aid in the fight against ransomware attacks.

Learn more 4 min read
Learn more
Combatting Ransomware. Part 1: Know the Enemy, Know Yourself
Combatting Ransomware. Part 1: Know the Enemy, Know Yourself

In the world of cybersecurity, ransomware is both a buzzword, and every security practitioner’s worst nightmare.

Learn more 4 min read
Learn more
What International Women’s Day Means to Me
What International Women’s Day Means to Me

In anticipation of International Women’s Day, I wanted to share...

Learn more 3 min read
Learn more
International Women’s Day: Better Together
International Women’s Day: Better Together

I am a mother, a daughter, a #fitbestie, a mentor,...

Learn more 3 min read
Learn more
International Women’s Day: 5 Questions with Omada’s CFO
International Women’s Day: 5 Questions with Omada’s CFO

In commemorating and celebrating International Women’s Day, I had the...

Learn more 3 min read
Learn more
1 2 3 5

Let's Get
Started

Let us show you how Omada can enable your business.