The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications
Unearthing the truth behind nonfederated applications through independent research.
Part two: Lockdown your unmanageable apps
In this Part 2 of a series examining Zero Trust in more detail, John provides an in-depth view of the second and third steps in implementing Zero...
From FUD to Framework: unpacking CISA's Zero Trust Maturity Model
Zero Trust is a journey and is not something you can buy from a vendor.
Cerby and Khoros partnership announcement
Today, we are thrilled to announce our new partnership with Khoros, which allows brands to launch, manage, and secure their social media profiles...
Tips to automate Adobe account management for Creative Cloud
As a creative professional, you likely use Adobe's suite of products to produce top-quality designs, illustrations, videos, and more. While Adobe's...
How to choose the right SSO provider
As more applications move to the cloud, Single Sign-On (SSO) has become a popular way to simplify user authentication across multiple services. ...