Agentic Identity
The growing chaos of AI agents: Why your identity architecture is headed for trouble

Key Takeaways Innovation is moving faster than governance, and agents are making it worse. AI agents are accessing your systems and acting in them autonomously at...

Agentic Identity
The hidden identity challenges of deploying AI agents across hybrid environments

As AI agents rapidly move from proof-of-concept to production, enterprises are running headfirst into a new set of challenges — ones that traditional identity and access...

App Identity Modernization
Modern authentication: Why OIDC and SAML are just the start

You updated your app by adding OIDC or SAML, then believed you now had a modern application. But here’s the uncomfortable truth: modern authentication protocols alone...

Company & Culture
Introducing The Identity Heroes

“I don’t think I’ve ever shared this story before!“ – Identifluencer Guest on The Identity Heroes Not all heroes wear a cape Every identity professional has...

Product & Engineering
We’re Switching to Calendar Versioning: Here’s Why

What’s calendar versioning? Calendar Versioning is a system where version numbers are tied directly to the release date. Our new format is: <YYYY>.<MM>.<REVISION> For example, version...

Product & Engineering
Why continuous discovery is critical to closing security gaps

Ask me how many applications are running in a typical enterprise cloud environment, and I’ll give you an estimate. Ask me again a few minutes later,...

Identity Security
How to rationalize IDPs (without painful migrations)

For enterprise CIOs, CISOs, and IT leaders, managing multiple identity providers (IDPs) is a costly, complex, and security-intensive challenge. Whether due to M&A activities, multi-cloud strategies,...

Governance & Standards
A guide to 5 compliance regulations that impact identity

Key Takeaways Identity-centric compliance failures come at a high cost. Fines range from thousands per violation under HIPAA to $75,000 per day for knowing violations under...

Identity Continuity
Securing ICAM in spacecraft-based missions

Whether your operations are orbiting Earth or heading for the Moon, there’s risk if you’re waiting for a login to time out. In space, where communication...

Product & Engineering
Building IDP Resilience

In today’s digital economy, identity is more than just an authentication checkpoint—it’s the backbone of user access, security, and continuity. And as CISOs and IAM architects...

Identity Security
The rise of IAM security

Key Takeaways IAM went from a back-office IT function to the core of enterprise security. Starting in the late 1990s with the internet boom and protocols...

Identity Security
Exploring identity security in 2026: key trends and best practices

Why who matters more than where you are The traditional perimeter is no longer what protects our critical information and systems. In 2025, securing data is...

Product & Engineering
Cybersecurity & Infrastructure Security Agency (CISA) Pledge

When the Cybersecurity and Infrastructure Security Agency (CISA) introduced the Secure by Design pledge in May of last year, it immediately resonated with our engineering philosophy;  it...

Identity Continuity
Resilience in extreme conditions: Why DDIL environments need continuous identity access

For organizations operating within the Department of Defense (DoD) space, identity resilience, and continuity are essentially non-negotiable. The stakes are high and often involve life-and-death scenarios....

Product & Engineering
How unified SSO reduces identity fragmentation

Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra...

App Identity Modernization
IAM tech debt: Balancing modernization and legacy identity infrastructure

“As enterprises modernize their identity systems to keep pace with multi-cloud strategies, they find themselves in a quagmire of technical debt, complexity, and resource constraints.” – State...

Identity Continuity
Enhancing the NIST Cybersecurity Framework with Identity Continuity

As recent events have shown, our technology systems are so connected that any interruption can cause global chaos. Organizations need robust cybersecurity defenses to protect their...

Identity & Access Management
Understanding the 7 A’s of IAM

How the 7 A’s of IAM build on IAM for dummies Each of the 7 A’s of IAM (identity and access management) plays an important role...