When ‘Platform’ Means Everything and Nothing In IAM Blog When ‘Platform’ Means Everything and Nothing In IAM My LinkedIn feed has been bombarded with endless commentary about the state of IAM, especially…Jai DarganAugust 6, 2025
The Realities of Going Passwordless Blog The Realities of Going Passwordless Passwords remain the most common form of authentication, despite being a leading cause of breaches.…HyddenJuly 30, 2025
The IAM Status Quo is Failing Enterprise Security Blog The IAM Status Quo is Failing Enterprise Security Over the last 60 days, fourteen Fortune 500 CISOs and IAM leaders have told me…Jai DarganJuly 22, 2025
Beyond the Alert: How IASM gives Actionable Context to XDR Blog Beyond the Alert: How IASM gives Actionable Context to XDR Extended Detection and Response (XDR) platforms are becoming a nerve center of the modern Security…HyddenJuly 1, 2025
How PAM and IGA Platforms Miss Critical Identity Terrain Blog How PAM and IGA Platforms Miss Critical Identity Terrain Introduction You've invested heavily in navigating your security landscape. Your Identity Governance & Administration (IGA)…HyddenJune 25, 2025
Control IGA Chaos with a Data-Driven Approach Blog Control IGA Chaos with a Data-Driven Approach Identity Governance and Administration (IGA) is essential for managing access rights, securing sensitive data, and…HyddenJune 12, 2025
The Lifecycle of an Identity Attack Blog The Lifecycle of an Identity Attack Introduction: From Account Creation to Data Exfiltration As organizations scale across hybrid and multi-cloud environments,…Steve GoldbergMay 23, 2025
Measuring the ROI of Proactive Identity Attack Surface Management (IASM) Blog Measuring the ROI of Proactive Identity Attack Surface Management (IASM) Identities are simultaneously the new perimeter and are also the most frequently observed attack vector.…HyddenMay 6, 2025
Top Challenges in Scaling Your PAM Practice Blog Top Challenges in Scaling Your PAM Practice For organizations with established mature PAM deployments, managing the attack surface has evolved beyond simple…HyddenApril 15, 2025
How M&A Activity Increases Identity Risks Blog How M&A Activity Increases Identity Risks A merger or acquisition is one of the most powerful value-creation moments for a business.…HyddenMarch 20, 2025
Recent Comments