Get the Guide to Modern IGA
glossary
images/glossary-thumbnail.png
Featured

Least Privilege Access vs. Zero Trust

What is least privilege? The principle of least privilege (PolP) is an information security model focused on restricting the number of identities with privileged access to networks, applications, data, programs, and processes to only those who require that access.

Read more
Latest articles

Social Engineering vs Phishing

Social engineering and phishing are both attacks used by malicious actors with the goal of compromising critical systems or data. Social engineering is a broad term used to characterize a set of tactics and techniques used to manipulate individuals into divulging confidential information or performing sensitive actions.

Read more

What Is Least Privilege?

What is least privilege? The principle of least privilege (PoLP) is an information security model focused on restricting the number of identities with privileged access to networks, applications, data, programs, and processes to only those who require that access.

Read more

What Is SAML vs SCIM?

What is SAML? SAML stands for “Security Assertion Markup Language” which is a standard protocol used for exchanging authentication and authorization data between parties, typically a service provider (SP) and an identity provider (IdP) such as Okta or Microsoft Entra.

Read more

JUMP to section

A

B

C

E

F

G

H

I

J

L

N

O

P

R

S

T

U

Z

images/newletter-post.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.