Blog – Identity Stack

Explore expert insights, industry trends, and practical solutions in identity and access management.

Get in Touch
Tick Tock: Time is Running Out for Microsoft Identity Manager

Tick Tock: Time is Running Out for Microsoft Identity Manager

The clock is ticking for Microsoft Identity Manager. In this interview, KeyData Cyber's Arthur Wojcicki outlines the risks of delaying your MIM migration and offers actionable strategies for a secure, cost-effective move to modern identity management.

June 24, 2025 | KeyData

Identity Stack
Securing the Autonomous Future: Why Identity is Key to Agentic AI

Securing the Autonomous Future: Why Identity is Key to Agentic AI

Agentic AI is more than a buzzword or trend, and it's more present than ever across industries, for both customers and workers. AI agents have risks beyond traditional AI because they have both human and machine traits. Your security strategy must...

May 27, 2025 | KeyData

Identity Stack
It's Elementary: Right-Sizing Identity Security for K-12

It's Elementary: Right-Sizing Identity Security for K-12

IT security in K-12 education presents a unique set of challenges. As decision-makers, you're tasked with safeguarding sensitive student and staff data, ensuring seamless access to critical learning tools, and defending against increasingly...

April 28, 2025 | KeyData

Identity Stack
Building Your Identity Fabric: A CISO & CTO Guide to Connected Identity

Building Your Identity Fabric: A CISO & CTO Guide to Connected Identity

Many organizations today continue to operate with a complex web of tools and applications, often fragmented across departments and functions. tools and applications, often fragmented across departments and functions. This fragmentation not only creates...

March 25, 2025 | KeyData

Identity Stack
Is ISaaS Right For You? A Look into Modern Managed Identity Services

Is ISaaS Right For You? A Look into Modern Managed Identity Services

Strong identity security is a necessity for organizations of all sizes, but it’s easier said than done. According to Awais Akbar, Head of Managed Services at KeyData Cyber, “traditional IAM programs often require multiple procurement cycles—separating...

February 26, 2025 | KeyData

Identity Stack
Identity Stack #1 - Solutioning IGA in Higher Education

Identity Stack #1 - Solutioning IGA in Higher Education

Higher Education faces unique identity security challenges, from managing dynamic user bases to safeguarding sensitive data and intellectual property. We sat down with KeyData Cyber CTO Brian Read to explore how Identity Governance and Administration...

January 25, 2025 | KeyData

Identity Stack

Don't know
where to start?

Looking to assess your current state, map out strengths, identify gaps and design a tailored roadmap to an optimal target state IAM program?

Book your complimentary assessment workshop and get started today.

Get Started
KeyData Cyber Logo

Copyright © 2024 KeyData Cyber.
All Rights Reserved.

keydatacyber twitterkeydatacyber facebookkeydata-associates linkedinkeydatacyber instagramKeyData Cyber youtube