Six Hidden Active Directory Risks that Could Leave You Vulnerable

If you work in enterprise IT, or even better, on an enterprise IT security team, you know your organization probably has an ocean of end users, accounts, and groups. With the rising prevalence of ...

Three Reasons Why Your Company Needs Robust Identity Hygiene and How to Implement It

SPHERE’s CEO & Founder, Rita Gurevich, was featured in Forbes Councils newest publication “Three Reasons Why Your Company Needs Robust Identity Hygiene and How to Implement It” With the increase ...

Security pros should focus on IAM and insider risks following recent Pentagon leak

SPHERE’s CEO, Rita Gurevich, was featured in SC Magazine’s April, 2023 issue with a contributed article, “Security Pros Should Focus on IAM and Insider Risks Following Recent Pentagon Leak .” The ...

Featured Blog: Future Role of Permissions in Security

The Enduring Importance of Permissions in Cybersecurity Reflecting on the evolution of cybersecurity from the mainframe era to the present day reveals an intriguing journey. A look back at an early ...

Why Organizations Are Failing at IAM and How True Identity Hygiene Can Help

Today’s organizations are inundated with a relentless stream of alerts from up to 76 different security tools in their arsenal, an increase of 18% from 2019 to 2021. Although advancements in tooling ...

Technical Interoperability For Cybersecurity

Enhancing Cybersecurity through Technical Interoperability The landscape of technology, especially within the realm of cybersecurity, has undergone monumental changes since the advent of early ...

Streamlining Cybersecurity: Balancing Attack Mitigation and Simplifying Compliance

In the intricate world of enterprise security, efforts are typically aligned with two fundamental goals. The primary aim is the direct mitigation of cyber threats targeting production systems—a ...

Cybersecurity Awareness Month: Don’t Sleep on How Critical IAM Is for Data Breach Defense

With almost two decades of experience analyzing identities, data platforms, and overall application and system landscapes, Rita provided her expert insight on IAM strategies, identity hygiene, and ...

email