At a time when the majority of our life happens behind a screen, being “cyber smart” is more important than ever. After all, this year has already seen more than a fair share of attacks and breaches, and cyberattacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks an...
SailPoint
Authored by Jim Moore It’s no secret that the market for software engineers, engineering managers, and product managers is crazy right now. We’re all getting bombarded by multiple inbound recruiter messages every week. So why do I continue to stay at SailPoint? That’s a pretty easy question to answer: I’ve been building SaaS products since before the term “SaaS” existed (w...
Authored by Justin Watkinson, Senior Staff DevOps Engineer One trait I appreciate about the DevOps team at SailPoint is an attitude towards “the other CI” — Continuous Improvement. I believe it’s a habit of highly effective DevOps teams to be able to get things out to production quickly, but also be able to quickly iterate and improve upon that solution, striving for quali...
The cybersecurity Pandora’s Box is still open, and it shows no signs of shutting down when it comes to our present-day digital posture. Last year, we found how the forced transition to remote work opened security and compliance gaps, effectively opening a cybersecurity Pandora’s Box. Presently, many enterprises are still grappling with the aftereffects of a hybrid workforc...
At SailPoint, we know that it’s important to love what you do, and love where you do it. If you’re interested in joining a company where you have an impact and can challenge yourself, check out our SaaS engineering and DevOps openings. Cybersecurity is one of the hottest sectors today, with new threats, technology and challenges emerging each day. And with that, there is a...
Authored by Frank Briguglio, CISSP – Public Sector Strategist, SailPoint There’s been a lot of movement from officials to shore up the U.S. government’s security posture. In early September, the Office of Management and Budget (OMB) published the draft strategy “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles” to identify critical security prioritie...
Authored by George V. Hulme Two of the most important trends in cybersecurity today are continuous security monitoring and the implementation of zero trust access controls. In the federal government, continuous monitoring and remediation fall under the purview of the Continuous Diagnostics and Mitigation program, known widely as CDM. CDM kicked off in earnest in 2014 and m...
Authored by Gary Savarino, Identity Strategist APAC Identity is not a new concept. Since the invention of the ‘digital identity,’ organizations have been tackling the challenges of identity with various approaches for decades. Identity capabilities, often generically categorized as Identity and Access Management (IAM) or Identity Management (IDM), represent multiple disti...
Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications. Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x...
Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before the accelerated growth of cloud adoption. The complexities of how cloud ...