Artificial Intelligence, it’s a Matter of Trust
January 5, 2023
Read about the three key lessons that can be applied to any identity management program stemming from the ChatGPT phenomenon.
A fresh, modern perspective on the world of IGA - blog posts and articles from IGA thoughtleaders that challenge conventional wisdom
January 5, 2023
Read about the three key lessons that can be applied to any identity management program stemming from the ChatGPT phenomenon.
December 1, 2022
Michal Czajkowski, a Developer at Omada, talks about his career at Omada and what it means to him to be an Omadian.
November 24, 2022
Mads Peitersen, Principal Customer Success Manager & Solutions Architect at Omada, shares his career path and what it means to him to be an Omadian.
November 17, 2022
When working to offboard workers, creating a standard process for deprovisioning is critical to avoid security risks and maintain compliance.
November 10, 2022
Requesting access can be trick or treat. Without an integrated platform end users waste time and organizations can create security blindspots.
November 3, 2022
While MFA and SSO help grant trust to users and applications, there are things that IGA brings to the table that not only improve security but also help with compliance and efficiency.
October 27, 2022
Azure guest accounts enable any organization using Azure AD to work safely and securely with users from other organizations. Get insights on how to control these accounts without hindering productivity.
October 21, 2022
Identity Governance is a critical and strategic part of any IAM program. Read the blog to learn more about identity governance, how to avoid pitfalls and benefit from best practices.
October 20, 2022
The theme for this year is to ‘see yourself in cyber', underlying that each person has a key role to play in keeping attackers at bay. Read the blog to learn more.
October 6, 2022
Read the blog to learn why regular access certification is so important for organizations and how to build and manage successful access certification campaigns.
September 29, 2022
Read the blog to learn what is role-based access control (RBAC), how it works, its benefits, examples, and best practices.
September 22, 2022
There are 3 main types of access control: RBAC, ABAC and PBAC. Read the blog to learn about the pros and cons of each access control type.
September 8, 2022
The American Data Privacy and Protection Act (ADPPA) is now ready for a full vote. Learn what is in the bill, what it means for companies, and how can an Identity Governance and Administration (IGA) solution help meet ADPPA requirements.
September 1, 2022
Data leakage is a term we hear about all the time. But what does data leakage mean? Find here answers to several key questions about data leaks, and what can be done to prevent them.
August 25, 2022
Key lessons learned and suggestions for what organizations can do to make sure they adhere to security and compliance best practices.
Let us show you how Omada can enable your business.