50 Best Identity and Access Management Blogs & News Websites in 2024
Identity and Access Management Blogs
Here are 50 Best Identity and Access Management Blogs you should follow in 2024
1. Solutions Review
The Solutions Review Identity Management blog is an essential resource for IT leaders and security professionals dedicated to mastering the intricacies of identity and access management (IAM). The blog provides comprehensive coverage of the latest trends, best practices, and technological advancements in IAM, offering practical guidance on implementing secure, scalable, and efficient identity management frameworks. From in-depth reviews of IAM solutions to expert analyses of emerging threats, Solutions Review equips its readers with the insights needed to protect their organizations and ensure robust identity security across all digital platforms.
Blog solutionsreview.com
Facebook Followers 575Twitter Followers 8.1K Frequency 2 posts/month Domain Authority 54 Get Email Contact Get Influential Bloggers ContactsGet access to 250k active Bloggers in 1500 niche categories.Get targeted media contact list in your niche at your fingertips so you can focus on running your campaign.Email us the type of bloggers you want to reach out for your marketing campaign at anuj@feedspot.com . We'll share blogger's data in an Excel or CSV format.Email us
2. The Identity and Access Management Blog | Avatier
The Avatier blog is a critical resource for IT professionals and business leaders focused on enhancing their cybersecurity and identity management strategies. It explores the latest trends and innovations in identity and access management (IAM), offering expert insights on how to safeguard digital assets and streamline user access across enterprise environments. The blog covers a range of topics, including IAM best practices, compliance, and the role of AI in cybersecurity. Avatier provides actionable advice that helps organizations fortify their security posture while enabling efficient, user-friendly access management solutions.
Blog avatier.com/blog
Facebook Followers 639Twitter Followers 1.7K Frequency 30 posts/quarter Domain Authority 43 Get Email Contact
3. Ubisecure
The Ubisecure blog is an indispensable resource for professionals and organizations focused on mastering digital identity management and secure customer interactions. It provides in-depth insights, expert analysis, and practical guidance on topics such as identity and access management (IAM), customer identity and access management (CIAM), and GDPR compliance. The blog's content is designed to help organizations navigate the complexities of digital identity in a rapidly evolving landscape, ensuring both security and seamless user experience. Ubisecure empowers its readers to build trust through robust identity solutions that protect sensitive data and enhance digital interactions.
Blog ubisecure.com
Twitter Followers 8K Frequency 1 post/quarter Domain Authority 36 Get Email Contact
4. Okta blogs
The Okta blog is a leading resource for organizations and IT professionals dedicated to securing identity and access management (IAM) in a digital-first world. It offers expert insights, best practices, and the latest trends in IAM, with a focus on simplifying secure access for users while enhancing overall security. The blog covers a broad spectrum of topics, including Zero Trust architecture, user authentication, and identity governance. Okta's content is crafted to help organizations navigate the complexities of modern IAM, ensuring seamless, secure access for all users across various platforms and environments.
Blog okta.com/blog
Facebook Followers 204Twitter Followers 41.8K Frequency 5 posts/week Domain Authority 73 Get Email Contact
5. OneLogin Identity and Access Management (IAM) Blog
The OneLogin blog is an authoritative source of knowledge for IT professionals and organizations focused on advancing their identity and access management (IAM) strategies. It delivers expert commentary, practical tips, and innovative solutions to help businesses secure their digital identities and streamline user access. The blog covers key topics such as single sign-on (SSO), multi-factor authentication (MFA), and the implementation of Zero Trust security models. OneLogin's content is designed to empower organizations to protect their digital environments, enhance user experiences, and stay ahead of emerging security threats in today's dynamic digital landscape.
Blog onelogin.com
Facebook Followers 3.6KTwitter Followers 15.3K Frequency 1 post/week Domain Authority 65 Get Email Contact
6. Gemalto JumpCloud
The JumpCloud blog is a pivotal resource for IT professionals and organizations seeking to streamline and secure their identity and access management (IAM) in cloud-based environments. It offers in-depth insights into managing modern IT infrastructures, focusing on topics such as Zero Trust security, directory services, and multi-factor authentication. The blog is designed to empower IT leaders with the knowledge and tools necessary to manage user identities, secure endpoints, and integrate cloud-based solutions seamlessly. JumpCloud's content serves as a guide for navigating the complexities of modern IT environments, helping organizations enhance security, productivity, and scalability.
Blog jumpcloud.com
Facebook Followers 11KTwitter Followers 18 Frequency 10 posts/month Domain Authority 50 Get Email Contact
7. SailPoint Blog
The SailPoint Blog is a premier destination for IT and cybersecurity professionals seeking to stay informed on the latest developments in identity governance and access management. The blog offers in-depth analyses, best practices, and expert opinions on topics such as digital identity management, compliance, and security strategy. By exploring cutting-edge technologies and trends, the SailPoint Blog empowers organizations to secure their digital identities and mitigate risks in an increasingly complex digital environment. It is an essential resource for those looking to enhance their identity governance frameworks and protect their organizations from evolving cyber threats.
Blog sailpoint.com
Facebook Followers 3.7KTwitter Followers 15.3KInstagram Followers 2K Frequency 30 posts/year Domain Authority 54 Get Email Contact
8. Microsoft Security Blog » Identity and access management -
The Microsoft Identity and Access Management blog is a vital resource for IT professionals and security experts focused on safeguarding digital identities in a cloud-first world. It offers deep dives into the latest identity management technologies, strategies for implementing Zero Trust security models, and best practices for ensuring secure access across hybrid environments. The blog covers a wide array of topics, including multi-factor authentication, identity governance, and the integration of AI in security. Microsoft's content empowers organizations to strengthen their security posture, reduce risks, and ensure compliance in an increasingly complex digital landscape.
Blog microsoft.com
Twitter Followers 351.7K Frequency 15 posts/year Domain Authority 98 Get Email Contact
9. Forrester Blog » IAM
The Forrester IAM blog is a premier destination for IT leaders and security professionals seeking to stay informed on the latest developments in identity and access management. It provides in-depth analyses, strategic advice, and forward-thinking perspectives on how to implement and optimize IAM frameworks within modern organizations. The blog covers a broad spectrum of IAM-related topics, including identity governance, privileged access management, and the impact of emerging technologies on security practices. Forrester's insights are crucial for those looking to fortify their digital defenses while enabling seamless, secure access across their enterprise.
Blog forrester.com
Facebook Followers 33.2KTwitter Followers 368.2K Frequency 7 posts/year Domain Authority 85 Get Email Contact
10. SecurityWeek » Identity & Access
The SecurityWeek Identity and Access Management blog is a comprehensive resource for IT security professionals dedicated to fortifying their organizations' identity and access management (IAM) strategies. It covers the latest developments in IAM technologies, offering expert insights and practical advice on topics such as identity verification, access control, and the implementation of Zero Trust architectures. The blog's content is designed to help organizations navigate the complex challenges of modern identity security, ensuring both robust protection and seamless access for users. SecurityWeek is an indispensable guide for those committed to enhancing their IAM frameworks in today's dynamic digital landscape.
Blog securityweek.com
Twitter Followers 218.3K Frequency 1 post/week Domain Authority 78 Get Email Contact
11. RSA Blog
The RSA Blog is a leading source of insights and analysis for cybersecurity professionals and IT leaders dedicated to safeguarding their organizations against digital threats. Covering a wide range of topics, from threat detection and identity management to regulatory compliance and risk mitigation, the blog offers expert guidance on navigating the complex cybersecurity landscape. It provides actionable strategies and the latest trends to help organizations protect their digital assets and ensure resilience against cyber attacks. The RSA Blog is an indispensable resource for those striving to stay ahead in the ever-changing world of cybersecurity.
Blog rsa.com/blog
Twitter Followers 117.4K Frequency 2 posts/month Domain Authority 77 Get Email Contact
12. Security Magazine » Identity Management
The Security Magazine Identity Management blog is an essential destination for cybersecurity professionals focused on safeguarding digital identities in an increasingly connected world. The blog offers expert analysis, emerging trends, and practical strategies on identity management, covering crucial topics like multi-factor authentication, identity governance, and Zero Trust frameworks. It provides insights into how organizations can protect sensitive data, ensure compliance, and mitigate identity-related risks. Security Magazine's content equips its readers with the knowledge and tools necessary to implement robust identity management solutions that enhance security and user experience.
Blog securitymagazine.com
Facebook Followers 9.1KTwitter Followers 28.2K Frequency 1 post/quarter Domain Authority 67 Get Email Contact
13. Thales blog
The Thales Group Digital Identity and Security blog is a critical resource for professionals focused on safeguarding digital identities and securing sensitive data in an increasingly complex digital landscape. It provides in-depth analyses and thought leadership on topics such as encryption, multi-factor authentication, and cybersecurity strategies, all aimed at protecting organizations from emerging threats. The blog's content is designed to guide readers through the challenges of implementing robust security frameworks while ensuring compliance with global regulations. Thales Group's expertise makes this blog an indispensable tool for staying ahead in the field of digital security.
Blog dis-blog.thalesgroup.com
Facebook Followers 67.9KTwitter Followers 20.1KInstagram Followers 25K Frequency 4 posts/month Domain Authority 70 Get Email Contact
14. WSO2 Blog » Identity & Access Management Blog
The WSO2 Identity and Access Management blog is a comprehensive guide for organizations and IT professionals dedicated to mastering the complexities of IAM in a digital world. It provides in-depth discussions on topics such as identity federation, API security, and the implementation of Zero Trust architectures. The blog's content is designed to equip readers with the knowledge and tools necessary to secure user identities, streamline access management, and ensure compliance with evolving regulatory standards. WSO2's insights help organizations build resilient, scalable IAM frameworks that safeguard their digital ecosystems.
Blog wso2.com
Facebook Followers 21.5KTwitter Followers 12.1K Frequency 14 posts/year Domain Authority 62 Get Email Contact
15. CSO » Identity and Access Management
The CSO Online Identity and Access Management blog is a crucial resource for cybersecurity professionals dedicated to safeguarding digital identities in an increasingly interconnected world. It provides in-depth analysis and expert advice on the latest trends, technologies, and best practices in identity and access management (IAM). The blog covers a wide range of topics, from multi-factor authentication and zero trust security models to compliance challenges and the future of IAM. CSO Online equips its readers with the knowledge and strategies needed to protect sensitive data and ensure robust access control within their organizations.
Blog csoonline.com
Facebook Followers 629Twitter Followers 721 Frequency 9 posts/month Domain Authority 85 Get Email Contact
16. Identity Automation Blog
The Identity Automation blog is a vital resource for IT professionals and organizations focused on identity and access management (IAM) in today's digital world. It offers in-depth analyses and practical advice on implementing secure, scalable, and efficient IAM solutions that protect critical data and streamline user access. The blog covers a wide range of topics, including multi-factor authentication, user provisioning, and compliance, providing insights that help organizations mitigate risks and enhance security. Identity Automation's content is designed to guide readers in adopting cutting-edge IAM practices that ensure both security and user convenience in increasingly complex IT environments.
Blog blog.identityautomation.com
Facebook Followers 184Twitter Followers 618 Frequency 1 post/week Domain Authority 38 Get Email Contact
17. Entrust Blog » Identity & Access Management
The Entrust Identity and Access Management Blog is a critical resource for IT professionals and cybersecurity leaders focused on safeguarding digital identities and securing access across enterprise environments. The blog covers a broad spectrum of topics, including the latest trends in identity management, zero trust security models, and compliance with evolving regulations. It offers expert advice and practical solutions for protecting sensitive data and ensuring that access to systems and information is both secure and seamless. The Entrust Identity and Access Management Blog is indispensable for those committed to fortifying their organization's security posture in an increasingly digital world.
Blog entrust.com
Facebook Followers 4.5KTwitter Followers 6.5KInstagram Followers 1.2K Frequency 1 post/quarter Domain Authority 63 Get Email Contact
18. Optimal IdM
The Optimal IdM blog is a comprehensive resource for IT professionals focused on identity and access management (IAM) solutions. It provides expert insights into implementing secure, scalable, and customizable IAM strategies that protect critical assets while ensuring seamless user access. The blog covers a range of topics, including cloud security, identity federation, and multi-factor authentication, offering practical advice for managing complex IT environments. Optimal IdM's content is designed to help organizations enhance their security posture, reduce risks, and streamline identity management processes, making it an indispensable guide for today's security-conscious enterprises.
Blog optimalidm.com
Facebook Followers 126Twitter Followers 470 Frequency 2 posts/month Domain Authority 38 Get Email Contact
19. Axiomatics Blog
The Axiomatics blog is a specialized resource for professionals focused on access control and data security within complex IT environments. It provides expert insights into best practices for implementing Attribute-Based Access Control (ABAC) and other advanced security frameworks to safeguard sensitive information across diverse systems. The blog explores topics such as regulatory compliance, cloud security, and the latest developments in identity and access management (IAM), offering actionable advice to help organizations protect their data assets. Axiomatics' content is essential for IT and security leaders looking to enhance their cybersecurity posture in an increasingly digital world.
Blog axiomatics.com
Facebook Followers 138Twitter Followers 2.4K Frequency 1 post/week Domain Authority 37 Get Email Contact
20. Identity Management Institute
Identity Management Institute Blog is an essential resource for professionals focused on safeguarding digital identities and enhancing cybersecurity practices. The blog offers in-depth articles, expert analyses, and practical guidance on identity management, risk mitigation, and regulatory compliance. By addressing the latest trends, challenges, and best practices in the field, the Identity Management Institute Blog equips organizations and security professionals with the tools and knowledge they need to protect sensitive information and maintain robust security frameworks in an increasingly digital world.
Blog identitymanagementinstitute.org
Facebook Followers 245Twitter Followers 3.8K Frequency 1 post/week Domain Authority 40 Get Email Contact
21. Transmit Security Blog
The Transmit Security blog is an authoritative resource for IT professionals and business leaders focused on elevating their identity and access management (IAM) strategies. It offers cutting-edge insights into the latest trends, challenges, and innovations in IAM, with a particular emphasis on passwordless authentication, biometrics, and user-centric security solutions. The blog's content is designed to help organizations enhance their security posture while delivering seamless user experiences. Transmit Security provides expert analyses and practical advice, empowering readers to navigate the complexities of modern security landscapes and implement robust, future-proof IAM systems.
Blog transmitsecurity.com
Facebook Followers 437Twitter Followers 702Instagram Followers 581 Frequency 5 posts/month Domain Authority 42 Get Email Contact
22. IDMWORKS Blog
The IDMWORKS Blog is a specialized platform that offers expert insights into identity and access management (IAM), cybersecurity, and IT strategy. The blog covers a wide array of topics, including IAM implementation, identity governance, and securing cloud environments, providing practical advice and best practices for organizations looking to strengthen their security posture. With a focus on the latest trends and technological advancements, the IDMWORKS Blog is an essential resource for IT leaders and security professionals aiming to protect their organizations from evolving cyber threats and enhance their overall IT infrastructure.
Blog idmworks.com
Facebook Followers 207Twitter Followers 541 Frequency 26 posts/year Domain Authority 37 Get Email Contact
23. EdTech Magazine » Identity Management
The EdTech Magazine K-12 Security blog is an essential resource for educators and IT professionals dedicated to safeguarding student identities and securing school networks. The blog offers expert insights and actionable strategies on identity management, data privacy, and cybersecurity within the K-12 education sector. It addresses the unique challenges faced by schools in protecting sensitive information while ensuring a seamless learning environment. The content provided by EdTech Magazine equips readers with the knowledge and tools needed to implement robust security measures, fostering a safer and more secure digital landscape for students and educators alike.
Blog edtechmagazine.com
Frequency 1 post/month Domain Authority 63 Get Email Contact
24. BizTech Magazine » Identity Management
The BizTech Identity Management Blog is a crucial resource for IT professionals and business leaders focused on safeguarding their organizations' digital identities and data. The blog provides in-depth analyses and practical advice on topics such as multi-factor authentication, zero trust security, and the latest trends in identity and access management (IAM). It is designed to help organizations navigate the complexities of digital security and ensure that their systems are both secure and compliant. The BizTech Identity Management Blog is an indispensable guide for those dedicated to protecting their organizations in an increasingly connected world.
Blog biztechmagazine.com
Facebook Followers 113.5K Frequency 4 posts/quarter Domain Authority 60 Get Email Contact
25. Avancer Corporation Blog
The Avancer Blog is a comprehensive platform for professionals seeking to stay informed about the latest trends and innovations in identity and access management (IAM) and cybersecurity. It provides in-depth analyses, expert advice, and practical solutions to help organizations safeguard their digital assets and ensure compliance with evolving security regulations. The blog covers a broad spectrum of topics, including IAM frameworks, risk management, and the integration of advanced security technologies. The Avancer Blog is an essential resource for IT leaders and security professionals committed to protecting their organizations in an increasingly complex digital landscape.
Blog avancercorp.com
Twitter Followers 945 Frequency 1 post/month Domain Authority 29 Get Email Contact
26. Identity Defined Security Alliance Blog
The Identity Defined Security Alliance blog is a critical resource for cybersecurity professionals and organizations dedicated to advancing identity-centric security practices. It offers insightful analyses, expert guidance, and practical strategies on implementing identity-defined security frameworks that protect digital identities and mitigate risks in an increasingly connected world. The blog covers a broad spectrum of topics, including identity governance, Zero Trust architectures, and emerging threats, all aimed at helping organizations secure their digital ecosystems. The Identity Defined Security Alliance provides invaluable knowledge to those committed to safeguarding identities and enhancing cybersecurity resilience.
Blog idsalliance.org
Twitter Followers 1.2K Frequency 1 post/month Domain Authority 37 Get Email Contact
27. HealthTech Magazine » Identity Management
HealthTech Magazine's Identity Management section provides critical insights into the rapidly evolving landscape of healthcare cybersecurity, with a particular focus on identity and access management (IAM). The blog addresses the unique challenges healthcare organizations face in safeguarding sensitive patient data while complying with strict regulatory requirements. By exploring the latest technologies, best practices, and strategic approaches to IAM, HealthTech Magazine empowers healthcare leaders to protect their organizations against emerging threats, ensuring that both patient privacy and data integrity are maintained in an increasingly digital environment.
Blog healthtechmagazine.net
Facebook Followers 113.5K Frequency 1 post/quarter Domain Authority 54 Get Email Contact
28. Sennovate
Sennovate Blog is a beacon for cybersecurity and identity management professionals, delivering cutting-edge insights on safeguarding digital assets. The blog explores the latest trends in cybersecurity, zero trust architecture, and identity and access management (IAM), providing practical guidance for protecting organizations against evolving threats. Through thought leadership and expert commentary, Sennovate Blog empowers its readers to implement robust security strategies, ensuring their systems and data remain secure in an increasingly interconnected world.
Blog sennovate.com
Twitter Followers 1.1K Frequency 4 posts/month Domain Authority 22 Get Email Contact
29. Curity
Curity Blog is a leading resource for professionals focused on the intersection of security, identity management, and API technology. The blog offers deep dives into critical topics such as OAuth, OpenID Connect, and API security, providing readers with the knowledge to safeguard digital identities and secure their applications against evolving threats. Through expert analysis and technical guidance, Curity Blog empowers its audience to implement robust security solutions that enhance trust and protect sensitive data in a digital-first world. It is an indispensable resource for those committed to mastering the complexities of modern identity management and cybersecurity.
Blog curity.io/blog
Twitter Followers 602 Frequency 6 posts/quarter Domain Authority 27 Get Email Contact
30. Evolveum - Identity Management and Identity Governance Blog
The Evolveum blog is an essential resource for IT professionals and organizations focused on identity management and security. It offers deep insights into the intricacies of open-source solutions, particularly around midPoint, Evolveum's flagship identity management platform. The blog covers a wide range of topics, including best practices for identity governance, the latest advancements in cybersecurity, and practical guides for optimizing IT infrastructure. With a strong emphasis on innovation and practical application, Evolveum provides its readers with the tools and knowledge needed to enhance security and streamline identity management processes in a rapidly evolving digital landscape.
Blog evolveum.com
Facebook Followers 167Twitter Followers 226Instagram Followers 68 Frequency 4 posts/quarter Domain Authority 35 Get Email Contact
Identity and Access Management Bloggers
Blogger Name | Designation | Blog Link | Twitter Handle | Twitter Follower | LinkedIn Profile | |
---|---|---|---|---|---|---|
Mike Costello | Writer | solutionsreview.com/identity-management | @infosec_review | 8.2K | https://www.linkedin.com/in/mike-costello-b18a0246/ | |
Rowena Bonnette | Vice President Of Digital Marketing & Author | avatier.com/blog | https://www.linkedin.com/in/rowenabonnette/ | |||
Nelson Cicchitto | CEO & Author | avatier.com/blog | https://www.linkedin.com/in/nelsoncicchitto/ | |||
Chloe Hartup | Digital Marketing Manager & Author | ubisecure.com/blog | https://www.linkedin.com/in/chloe-hartup/ | |||
Keith Uber | Vice President & Author | ubisecure.com/blog | https://www.linkedin.com/in/keithuber/ | |||
Oscar Santolalla | Senior Sales Engineer & Author | ubisecure.com/blog | https://www.linkedin.com/in/oscarsantolalla/ | |||
Francesca Hobson | Senior Marketing Manager & Author | ubisecure.com/blog | https://www.linkedin.com/in/francesca-hobson/ | |||
Steve Waite | Chief Marketing Officer & Author | ubisecure.com/blog | https://www.linkedin.com/in/stevewaite/ | |||
Darren Thomson | Vice President & Author | onelogin.com/blog | https://www.linkedin.com/in/darren-thomson-80092b1/ | |||
Max Shofron | Solution Engineer Team Lead & Author | onelogin.com/blog | https://www.linkedin.com/in/maxwellshofron/ | |||
Mark Cockbill | Senior Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/markcockbill/ | |||
Alicia Townsend | Product Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/alicia-townsend/ | |||
Jack Shepherd | Content Marketing Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/jackpshepherd/ | |||
David Worthington | Blogger | jumpcloud.com/blog | https://www.linkedin.com/in/worthingtondavid/ | |||
Kate Lake | Content Writer | jumpcloud.com/blog | https://www.linkedin.com/in/kathryn-lake/ | |||
Oliver Wai | Head Of Product Marketing & Author | jumpcloud.com/blog | https://www.linkedin.com/in/oliverwai/ | |||
Kelsey Kinzer | Seo Content Manager & Author | jumpcloud.com/blog | https://www.linkedin.com/in/kelseykinzer/ | |||
Grady Summers | Vice President & Author | sailpoint.com/blog | https://www.linkedin.com/in/gsummers/ | |||
Ryan Naraine | Editor At Large | securityweek.com/category/identity-access | @ryanaraine | 27K | https://www.linkedin.com/in/ryanaraine/ | |
Eduard Kovacs | Contributing Editor | securityweek.com/category/identity-access | @eduardkovacs | 13.9K | https://www.linkedin.com/in/eduard-kovacs-7b796134/ | |
Ionut Arghire | News Reporter | securityweek.com/category/identity-access | @ionutarghire | 1.2K | https://www.linkedin.com/in/ionut-arghire-92349a46/ | |
Ben Lebeaux | Director Of Communications & Author | rsa.com/blog | https://www.linkedin.com/in/ben-lebeaux-87236311/ | |||
Victoria Brown | Graphic Design Manager & Author | rsa.com/blog | https://www.linkedin.com/in/victoria-brown10/ | |||
Michael Nadeau | Executive Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/menadeau/ | |||
Andrew Flynn | Regional Executive Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/agflynn/ | |||
Samira Sarraf | Regional Editor | csoonline.com/in/category/identity-and-access-management | @samira_sarraf | 273 | https://www.linkedin.com/in/samirasarraf/ | |
Marc Ferranti | Executive Editor | csoonline.com/in/category/identity-and-access-management | @marcferranti | 543 | https://www.linkedin.com/in/marcferranti/ | |
Varun Aggarwal | News Editor | csoonline.com/in/category/identity-and-access-management | @aggarwalvarun | 2K | https://www.linkedin.com/in/varunaggarwal84/ | |
Lucian Constantin | Senior Writer | csoonline.com/in/category/identity-and-access-management | @lconstantin | 3.4K | https://www.linkedin.com/in/lconstantin/ | |
Edmund Kennedy | Australia Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/ed-kennedy-01 | |||
Xiou Ann Lim | Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/xiouann/ | |||
Amy Bennett | Executive Editor | csoonline.com/in/category/identity-and-access-management | @atbennett | 1.8K | https://www.linkedin.com/in/amytbennett/ | |
Diana McGhee | Author | blog.identityautomation.com | @dmmcghee | 2.2K | https://www.linkedin.com/in/dianamyersmcghee/ | |
George Wainblat | Director Of Product Management & Author | transmitsecurity.com/blog | https://www.linkedin.com/in/georgewainblat/ | |||
Ravit Aviv | Director Of Technology Alliances & Author | transmitsecurity.com/blog | https://www.linkedin.com/in/ravitaviv/ | |||
Ryan Petersen | Editor In Chief | edtechmagazine.com/k12/security/identity-management | @ryanpete | 2.5K | ||
Ricky Ribeiro | Editorial Director | edtechmagazine.com/k12/security/identity-management | @ricktagious | 2.7K | ||
Matt Mclaughlin | Associate Editorial Director | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Jean Dal Porto | Editorial Strategist | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Jordan Scott | Senior Editor | edtechmagazine.com/k12/security/identity-management | @j_scott_writer | 367 | ||
Matt Mclaughlin | Associate Editorial Director | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Jean Dal Porto | Editorial Strategist | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Matt Mclaughlin | Associate Editorial Director | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Kelly Konrad | Associate Executive Editor | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/kelly-konrad-5941273/ | |||
Jean Dal Porto | Editorial Strategist | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Anna Ogurekova | Marketing Director & author | evolveum.com/blog | https://www.linkedin.com/in/annaogurekova/ | |||
Veronika Kolpascikova | Digital marketing specialist & author | evolveum.com/blog | https://www.linkedin.com/in/veronikalatkova/ |