Blog
Identity as the New Perimeter The security landscape has shifted. According to the Verizon 2024 Data Breach Investigations Report, 74% of breaches involve the human element—stolen credentials, phishing,…
Matthew Maher
·
Nov 5, 2025
Blog
Introduction Agentic AI and conversational AI present exciting opportunities to transform how organizations conduct and manage access reviews. Here’s a breakdown of how to use Agentic AI in…
Niraj Tenany
·
Jul 15, 2025
Blog
Introduction In this blog, I share details on how to go about initiating an access review and managing the initiative. To find out more about access reviews, you can…
Niraj Tenany
·
Jun 18, 2025
Blog
Introduction IGA stands for Identity Governance and Administration. It's a core component of identity and access management (IAM) that focuses on managing digital identities and their access rights…
Niraj Tenany
·
Jun 11, 2025