- Services
-
- Who we are
- Resources
-
-
- Stay up-to-date
—read our experts' unique takes on trends in cybersecurity.
-
- Explore our resources for advice on boosting your organization's security.
-
-
- Get in touch
James Babb
James Babb works with customers to implement effective security and identity management solutions that are supported by precise planning and design. At ease with exploring new technologies, he uses his background in programming and scripting to automate solutions where possible and has developed expertise in single sign-on platforms and automated role-based access control.
The most significant AI security risks in your organization don’t come from careless interns or external threats. They come from your highest performers—employees who understand your systems best, move fastest, [...]
Every security team has lived through Shadow IT. First, it was cloud storage with Dropbox, then Box, then Google Drive. Tools appeared faster than procurement could react, and security teams [...]
The value of Privileged Access Workstations (PAWs) is commonly known in the realms of cybersecurity architecture and identity governance, as they help defend your IT environment by reducing the attack [...]
Modern applications no longer live in a vacuum. They connect consumers, business customers, and partners through web and mobile interfaces, and that means identity becomes a core feature. In the [...]
As organizations increasingly embrace digital transformation, electronically stored data is a company’s most valuable asset. Unfortunately, it’s also one of the most vulnerable. Whether it’s customer records, financial data, intellectual [...]
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their careers within a single organization. [...]
Active Directory (AD) is a cornerstone of IT infrastructure for many organizations, providing essential services for managing and securing resources. This guide will take you through the essentials of Active [...]
In today’s digital age, the complexity and connectivity of organizational ecosystems expose them to a myriad of security threats, with insider risks standing out as particularly worrisome. Recent trends indicate [...]
If you work in a higher education environment, there exists a set of standards that must be implemented to allow students and faculty to collaborate on projects at other schools [...]
In previous blog posts (Part 1, Part 2), we discussed a powerful feature in Entra ID (formerly Azure Active Directory) known as dynamic membership rules. In short, Entra ID’s dynamic [...]


