February 21, 2017

Passwords: Insecure Since 1962

Barry Gordon, Senior IAM Consultant, SecureITsource, Inc. In the early 1960’s, the Compatible Time-Sharing System at MIT required a password to login and use the system. […]
January 17, 2017

The Internet of Things and its effect on Enterprise Security

Mike Campbell, IAM Consultant, SecureITsource, Inc. Smart devices comprised a network of almost 23 billion devices in 2016. While internet-connected devices remain mostly in the consumer […]
January 10, 2017

What to expect from your annual CyberArk health assessment

Christopher Meek, IAM Consultant, SecureITsource, Inc. Yearly health assessments for CyberArk deployments are invaluable, and there is no better time than the present to begin planning […]
December 19, 2016

I Got Them Keys, keys, keys

Zack Zando, IAM Consultant, SecureITsource, Inc. Have you ever wondered what DJ Khaled is talking about when he says “I got them keys, keys, keys”? No […]
December 13, 2016

Protecting the Keys to the Kingdom

Mike Winslow, IAM Consultant, SecureITsource, Inc. Privileged accounts are often referred to as the keys to a company’s digital kingdom. Yet many of the people responsible […]
December 6, 2016

IAM Agile Part 1: Let Me Tell You a Story…

Brian Weigel, IAM Consultant, SecureITsource, Inc. Welcome to the first in a new series of articles focusing on Agile development in Identity and Access Management programs! These […]
November 29, 2016

Putting off Identity Management? STOP! It’s easier than you might think!

Barry Gordon – Senior IAM Consultant, SecureITsource, Inc. The realm of Identity & Access Management (IAM) can be overwhelming at times. An organization may have thousands […]
November 22, 2016

Privileged Credentials – The Human Factor

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. In today’s IT security threat landscape, it would appear that no human, business, or public entity is truly safe […]
October 17, 2015


secureITsource announced the expansion of their North American IT professional services operations. The firm will focus on four main practice disciplines including Identity and Access Management, Enterprise […]