Security pros should focus on IAM and insider risks following recent Pentagon leak
SPHERE’s CEO, Rita Gurevich, was featured in SC Magazine’s April, 2023 issue with a contributed article, “Security Pros Should Focus on IAM and Insider Risks Following Recent Pentagon Leak .” The ...
Featured Blog: Future Role of Permissions in Security
The Enduring Importance of Permissions in Cybersecurity Reflecting on the evolution of cybersecurity from the mainframe era to the present day reveals an intriguing journey. A look back at an early ...
Why Organizations Are Failing at IAM and How True Identity Hygiene Can Help
Today’s organizations are inundated with a relentless stream of alerts from up to 76 different security tools in their arsenal, an increase of 18% from 2019 to 2021. Although advancements in tooling ...
Technical Interoperability For Cybersecurity
Enhancing Cybersecurity through Technical Interoperability The landscape of technology, especially within the realm of cybersecurity, has undergone monumental changes since the advent of early ...
Streamlining Cybersecurity: Balancing Attack Mitigation and Simplifying Compliance
In the intricate world of enterprise security, efforts are typically aligned with two fundamental goals. The primary aim is the direct mitigation of cyber threats targeting production systems—a ...
Cybersecurity Awareness Month: Don’t Sleep on How Critical IAM Is for Data Breach Defense
With almost two decades of experience analyzing identities, data platforms, and overall application and system landscapes, Rita provided her expert insight on IAM strategies, identity hygiene, and ...
Reinventing Security Perimeters: The Critical Role of Identity in Cybersecurity
The cybersecurity landscape has embraced a pivotal aphorism: "identity is the new perimeter." This paradigm shift signifies a move away from relying on corporate firewalls as the primary defense ...
Sorting through the rubble to define identity
Rita Gurevich is a cybersecurity practitioner-turned-entrepreneur who entered the financial services field while attending the Stevens Institute of Technology, where she earned a bachelor’s in ...
Addressing the Rise in Cybercrime: A Shift in Strategy Towards Prevention
The landscape of criminal activity against businesses has seen varying trends over the years, with some areas witnessing significant improvements. A notable example is the decline in bank robberies ...
Evolving Cyber Threats: From Hackers to State-Sponsored Actors
Evolving Cyber Threats: From Hackers to State-Sponsored Actors Cyber threats have undergone significant transformation since the early days of the internet, evolving from youthful explorations of ...
The Essential Role of Cyber Hygiene in Cloud Security
While moderating a recent conference panel session of Chief Information Security Officers (CISOs), I posed a question about their primary protection strategies as they transition infrastructure to ...
Mastering Data Governance: A Practical Guide for Enterprises
Data Governance: Implementing a Functional Strategy Data governance has emerged as a critical discipline for enterprises. By exercising positive control over data management processes, organizations ...