All Posts

The Value of Access Control Consistency: Centralizing Policies in Enterprise Architecture

Gal Helemski August 21 2024
This blog is part of a 4-part blog series on the values of centralizing authorization policies.

Establishing Control with Central Policy Management of Access Controls – Part 2

Gal Helemski June 24 2024
This blog is part of a 4-part blog series on the values of centralizing authorization policies In the world of ...
Central Policy Management of Access Controls – Part 1

Visibility with Central Policy Management of Access Controls – Part 1

Gal Helemski May 22 2024
This blog is part of a 4-part blog series on the values of centralizing authorization policies The explosion of ...

How to Address Third-Party & B2B Access Control Challenges in IAM

Mickey Martin May 4 2024
Despite technological advancements in the field, third-party access remains a persistent challenge for many IAM ...

Identity Security Company

Gal Helemski April 1 2024
I am pleased to announce that PlainID has adopted new features and services into its Platform. These new services allow ...
PlainID's SQL Database Authorizer Revolutionizes Access Control

What Does Authorization Have to do with ISPM?

Mickey Martin May 21 2024
Previously I wrote a blog talking about what ISPM could mean for the future of Identity by comparing it to other *SPM ...

What is Identity Security Posture Management?

Mickey Martin May 21 2024
As the world of identity and access management dcontinues to grow and evolve into a central focus on how businesses ...
OWASP API Security Risks

PBAC: Top 10 OWASP API Risks - Key Insights & Effective Mitigation

Mickey Martin January 8 2024
In today's digitally-centric organizations, the development of products, services, and solutions increasingly depends ...
Modern Authorization: Strengthening Cybersecurity and Ensuring Data Compliance

Modern Authorization: Strengthening Cybersecurity & Ensuring Data Compliance

Michelle Fallon December 13 2023
“Authorization answers the question of who can access what and under what circumstances. It takes a well-defined, ...
BigID Data Protection Framework

BigID & Plainid Partner to Provide Data Protection Framework for Enterprises

Mickey Martin November 21 2023
In a recent announcement, BigID and PlainID unveiled their strategic partnership, offering a comprehensive solution to ...
Streamlined Access Control with Power BI and PlainID

Unlocking Secure and Streamlined Access Control in Power BI with PlainID

Lani Leuthvilay November 16 2023
The Security Gap in Native Access Control As businesses continue to navigate through vast oceans of data, tools like ...
A Roadmap to Modern Authorization Blog Image

A Roadmap to Modern Authorization: From Assessment to Implementation

Julie Kendall October 3 2023
In today's digital landscape, effective authorization controls are crucial for securing critical business assets. As ...
What Is Dynamic Authorization

What Is Dynamic Authorization and Why Is It so Critical for Security Resilience

Rose Kim July 26 2023
The growing number of cyberattacks and data breaches has made security resilience a top priority for organizations ...

Rose Kim

Recent Posts

all posts