Identity is rooted in IT operations. In fact, when most people think of identity, they think of access management, as in identity and access management, or IAM.
The shift to the cloud and remote work, combined with the rise of phishing and other identity-related attacks, puts identity security at the forefront of cybersecurity concerns.
Read my blog to learn more about identity’s relationship to cybersecurity.