Information Security Leader, Author, Instructor and Speaker

Default utility Image

How to Choose an Identity and Access Management Solution for Higher Education TAGS: | | From a string of high-profile ransomware attacks to the compromise of SolarWinds network monitoring tools, higher education continues to find …Continue reading →

Default utility Image

Select a customer IAM architecture to boost business, security TAGS: | | The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have …Continue reading →