SailPoint

The SailPoint Blog
Women in Identity Security: Sylvia Sykula

At SailPoint, our crew members show us every day that anything is possible. Sylvia Sykula, eLearning Developer, solidifies this truth even more. In this Women in Identity Security blog, we ask Sylvia about her career journey in eLearning and discover why she believes that learning from your failures can be a path to your success. How did you come to your identity security ...

Data Privacy Day 101

Data Privacy Day (known in Europe as Data Protection Day) is an international event that occurs every year on January 28. The purpose of the day is to raise awareness about how businesses and individuals can promote privacy and data protection best practices. But where did Data Privacy Day come from and how can you celebrate and protect yourself? We get into the 101 below. ...

Get Familiar with the Cyber Basics

At a time when the majority of our life happens behind a screen, being “cyber smart” is more important than ever. After all, this year has already seen more than a fair share of attacks and breaches, and cyberattacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks an...

Hot Jobs: SailPoint Engineering

Authored by Jim Moore It’s no secret that the market for software engineers, engineering managers, and product managers is crazy right now. We’re all getting bombarded by multiple inbound recruiter messages every week. So why do I continue to stay at SailPoint? That’s a pretty easy question to answer: I’ve been building SaaS products since before the term “SaaS” existed (w...

Deploying a New Region Faster Than You Can Bake a Potato

Authored by Justin Watkinson, Senior Staff DevOps Engineer One trait I appreciate about the DevOps team at SailPoint is an attitude towards “the other CI” — Continuous Improvement. I believe it’s a habit of highly effective DevOps teams to be able to get things out to production quickly, but also be able to quickly iterate and improve upon that solution, striving for quali...

What Greek Mythology Can Teach Us About Present-Day Cybersecurity

The cybersecurity Pandora’s Box is still open, and it shows no signs of shutting down when it comes to our present-day digital posture. Last year, we found how the forced transition to remote work opened security and compliance gaps, effectively opening a cybersecurity Pandora’s Box. Presently, many enterprises are still grappling with the aftereffects of a hybrid workforc...

Why You Should Consider a Cyber Career

At SailPoint, we know that it’s important to love what you do, and love where you do it. If you’re interested in joining a company where you have an impact and can challenge yourself, check out our SaaS engineering and DevOps openings. Cybersecurity is one of the hottest sectors today, with new threats, technology and challenges emerging each day. And with that, there is a...

As the U.S. Government Moves Towards Zero Trust, SailPoint Continues To Support Key Federal Security Initiatives

Authored by Frank Briguglio, CISSP – Public Sector Strategist, SailPoint There’s been a lot of movement from officials to shore up the U.S. government’s security posture. In early September, the Office of Management and Budget (OMB) published the draft strategy “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles” to identify critical security prioritie...

CISA Q&A: The Road to Continuous Monitoring and Zero Trust Access Control

Authored by George V. Hulme Two of the most important trends in cybersecurity today are continuous security monitoring and the implementation of zero trust access controls. In the federal government, continuous monitoring and remediation fall under the purview of the Continuous Diagnostics and Mitigation program, known widely as CDM. CDM kicked off in earnest in 2014 and m...

Identity Discombobulated – Reorienting Identity in the Enterprise

Authored by Gary Savarino, Identity Strategist APAC Identity is not a new concept. Since the invention of the ‘digital identity,’ organizations have been tackling the challenges of identity with various approaches for decades. Identity capabilities, often generically categorized as Identity and Access Management (IAM) or Identity Management (IDM), represent multiple disti...