top of page


Jun 12, 20244 min read
The Importance of Vulnerability Management: Insights from the 2024 Verizon DBIR
In the dynamic landscape of cybersecurity, vulnerability management stands as a cornerstone of organizational defense strategies. The...

May 2, 202410 min read
Reevaluating Our Dependence on Microsoft: May Be It’s Time to Diversify
Today Microsoft is everywhere. Active Directory was the enterprise infrastructure backbone once, and still is. However, our dependence on...


Apr 1, 20245 min read
The Impact of Simplification, Consolidation, and Automation in Cybersecurity: Implications and Benefits
Executive Summary In the rapidly evolving digital landscape, organizations face unprecedented cybersecurity challenges. The complexity of...

Mar 8, 20233 min read
5 Strategies to Zero Trust Success Without Breaking The Bank
This article dives into 5 proven strategies that organizations can use today to reduce these costs when migrating to zero trust security.


Feb 6, 20234 min read
Zero Trust Security: Getting Identity Right
Why Identity is the first pillar of the Zero Trust Security Maturity Model and how to get it right with actionable steps.


Jan 31, 20234 min read
Custom QuickLinks in SailPoint IdentityIQ
Hello, everyone. In this post, we'll be discussing how add a custom QuickLink to a SailPoint IdentityIQ instance. I recently implemented...

Jan 23, 20234 min read
One Way to Overcome the Cybersecurity Labor Crunch
One of the core problems facing organizations and their cybersecurity is choosing an architecture that creates a never-ending rise in...

Jan 10, 20235 min read
MFA Isn't Enough to Protect Your Business - Here's What You Need to Know
Have you read about the September 2022 Uber attack where the attacker was able to overcome MFA to prowl all over their intranet with...


Dec 15, 20224 min read
Sending Password Reminder Emails with SailPoint IdentityIQ
Hello, everyone. In this post, we'll be discussing how to send SailPoint IdentityIQ users email reminders that their passwords will be...


Dec 8, 20223 min read
Setting SailPoint IdentityIQ Password Expiration via REST API
Hello, everyone. In this post, we'll be discussing how to set an IIQ user's password expiration via REST, or to be more precise, how to...

May 19, 20227 min read
Why You Need to Externalize Your SailPoint Reporting?
Discover the benefits of externalizing your SailPoint reporting.

Nov 26, 20214 min read
Transforming your DevOps Environment to DevSecOps using Open Source Tools
Introduction As more companies adopt the remote working paradigm, security concerns have skyrocketed. This is an issue in the healthcare...

May 10, 20213 min read
Do Not Use An Administrator Account
This blog details why is it not a good idea to use a work or personal account with Administrator permissions on your PC.

Sep 23, 20206 min read
Who added that user to the group? Security automation and reverting unauthorized changes.
How do you identify unauthorized changes in your network? How do you hunt through the tons of logs and data, and revert them?

Sep 18, 20203 min read
Azure Sentinel – the Smart SIEM SOAR Solution
Microsoft’s Azure Sentinel is a cloud native smart SIEM SOAR tool combining the power of the Cloud, AI and the Intelligent Security Graph.


Sep 29, 20193 min read
How to Migrate to the Cloud? - A Security Architect's Thoughts on Enterprise Digital Transformation
Digital Transformation - A high-level guide to what things you should bear in mind on your journey to Cloud Migration.
bottom of page