Articles by Suramya Bakshi, Director, Identity Access Management at Cyderes


Latest from this author

  • Security Logo
    · Tech

    Understanding Zero Trust in IAM and IGA Platforms

    The rise of cloud computing and expanding remote work, especially after Covid, has blurred the traditional boundaries of networks, making the old castle-and-moat approach to cybersecurity obsolete. In this context, the Zero Trust cybersecurity model challenges the notion of who to trust, why, and how.

Most Popular
Real Time Analytics