50 Best Identity and Access Management Blogs & News Websites in 2025
Identity and Access Management Blogs
Here are 50 Best Identity and Access Management Blogs you should follow in 2025. Subscribe in one place on FeedSpot Reader.
1. Solutions Review
Blog https://solutionsreview.com/identity-management/ + Follow Blog
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Identity & Access Management and posts it here.MORE Email ****@solutionsreview.com
Facebook Followers 575Twitter Followers 8.1K Frequency 2 posts/month Domain Authority 54 Read Now Get Email Contact Get Influential Bloggers ContactsGet access to 250k active Bloggers in 1500 niche categories.Get targeted media contact list in your niche at your fingertips so you can focus on running your campaign.Email us the type of bloggers you want to reach out for your marketing campaign at anuj@feedspot.com . We'll share blogger's data in an Excel or CSV format.Email us
2. The Identity and Access Management Blog
Blog https://www.avatier.com/blog/ + Follow Blog
Identity and Access Management Blog by Avatier, leader of Identity and Access Management (IAM) software, IT risk management, enterprise password management, user provisioning, information security services, single sign on solutions.MORE Email ****@avatier.com
Facebook Followers 639Twitter Followers 1.7K Frequency 30 posts/quarter Domain Authority 43 Read Now Get Email Contact
3. Ubisecure Blog
Blog https://www.ubisecure.com/blog/ + Follow Blog
Ubisecure is a pioneering European Customer Identity & Access Management (CIAM) software provider and cloud identity services enabler.
Email ****@ubisecure.com
Twitter Followers 8K Frequency 1 post/quarter Domain Authority 36 Read Now Get Email Contact
4. Okta s Blog
Blog https://www.okta.com/blog/ + Follow Blog
Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.
Email ****@okta.com
Facebook Followers 204Twitter Followers 41.8K Frequency 5 posts/week Domain Authority 73 Read Now Get Email Contact
5. OneLogin Identity and Access Management (IAM) Blog
Blog https://www.onelogin.com/blog/ + Follow Blog
OneLogin Unified Access Management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.Get the latest news and insights on Identity and Access Management (IAM).MORE Email ****@onelogin.com
Facebook Followers 3.9KTwitter Followers 15.3K Frequency 1 post/week Domain Authority 65 Read Now Get Email Contact
6. Gemalto JumpCloud Blog
Blog https://jumpcloud.com/blog + Follow Blog
Gemalto brings trust to an increasingly connected world with security software for authenticating identities and protecting data.
Email ****@jumpcloud.com
Facebook Followers 11KTwitter Followers 18 Frequency 10 posts/month Domain Authority 50 Read Now Get Email Contact
7. Microsoft Security Blog » Identity and access management -
Blog https://www.microsoft.com/en-us/security/blog.. + Follow Blog
Read the latest news and posts and get helpful insights about Identity and access management from Microsoft's team of experts at Microsoft Security Blog. Microsft security blog features expert coverage on security matters such as zero trust, identity and access management, threat protection, information protection, and security management.MORE Twitter Followers 351.7K Frequency 15 posts/year Domain Authority 98 Read Now Get Email Contact
8. Forrester Blog » IAM
Blog https://www.forrester.com/blogs/category/iam-.. + Follow Blog
Are they who they say they are? Digital has made IAM crucial and complicated. Explore the latest trends in IAM from Forrester. Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership, strategy, and operations.MORE Email ****@forrester.com
Facebook Followers 33.2KTwitter Followers 368.2K Frequency 7 posts/year Domain Authority 85 Read Now Get Email Contact
9. SecurityWeek » Identity & Access
Blog https://www.securityweek.com/category/identit.. + Follow Blog
SecurityWeek helps cybersecurity professionals do their jobs better by providing timely news, information, analysis and insights from experts in the trenches. Created by industry professionals and a seasoned news team, SecurityWeek produces actionable content and a portfolio of industry-leading events to help cybersecurity professionals around the globe defend their organizations from increasingly complex cyber threats. Get the latest updates in Identity and access, security tips, news, insights and more!MORE Twitter Followers 218.3K Frequency 1 post/week Domain Authority 78 Read Now Get Email Contact
10. RSA Blog
Blog https://www.rsa.com/blog/ + Follow Blog
Security starts with identity. Insights from RSA's global leaders on authentication, passwordless technology, zero trust, and more. Today RSA is a global leader laser-focused on identity and access management, reflecting the company's belief that assuring digital identities throughout their lifecycle is of preeminent importance in cybersecurity. RSA focuses on serving the planet's most security-sensitive organizations, with specialties in federal government, financial services, healthcare, energy and technology services.MORE Email ****@rsa.com
Twitter Followers 117.4K Frequency 2 posts/month Domain Authority 77 Read Now Get Email Contact
11. Thales blog
Blog https://dis-blog.thalesgroup.com/ + Follow Blog
Thales is a global high technology leader investing in digital and 'deep tech' innovations to build a future we can all trust, which is vital to the development of our societies. Follow the Digital Identity & Security Blog for all the latest news and updates, insights and more!MORE Facebook Followers 74.9KTwitter Followers 20.1KInstagram Followers 25.9K Frequency 4 posts/month Domain Authority 70 Read Now Get Email Contact
12. WSO2 Blog » Identity & Access Management Blog
Blog https://wso2.com/blog/identity-and-access-man.. + Follow Blog
WSO2 solutions give enterprises the flexibility to deploy applications and services on-premises, on private or public clouds, or in hybrid environments and easily migrate between them as needed. And because all of the products are pre-integrated, enterprises can focus on value-added services and get to market faster. Explore the Identity & Access Management Blog for all the latest news and updates, security tips and trends and more!MORE Email ****@wso2.com
Facebook Followers 28.7KTwitter Followers 12.1K Frequency 14 posts/year Domain Authority 62 Read Now Get Email Contact
13. CSO » Identity and Access Management
Blog https://www.csoonline.com/in/category/identit.. + Follow Blog
Stay up to date with the latest news, how-tos, features, reviews, and videos about Identity and Access Management. CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks. With incisive content that addresses all security disciplines from risk management to network defense to fraud and data loss prevention, CSO offers unparalleled depth and insight to support key decisions and investments for IT security professionals.MORE Email ****@foundryco.com
Facebook Followers 664Twitter Followers 721 Frequency 9 posts/month Domain Authority 85 Read Now Get Email Contact
14. Identity Automation Blog
Blog https://blog.identityautomation.com/ + Follow Blog
Learn more about identity and access management. RapidIdentity is the most complete Identity and Access Management (IAM) platform available, giving organizations greater security, increased business agility, and lower costs of identity and access management.MORE Email ****@identityautomation.com
Facebook Followers 184Twitter Followers 618 Frequency 1 post/week Domain Authority 38 Read Now Get Email Contact
15. Optimal IdM
Blog https://optimalidm.com/ + Follow Blog
Optimal IdM is an global provider of Identity and Access Management (IAM) Solutions and Services. View our award-winning suite of IAM products today.
Email ****@optimalidm.com
Facebook Followers 139Twitter Followers 470 Frequency 2 posts/month Domain Authority 38 Read Now Get Email Contact
16. Axiomatics Blog
Blog https://axiomatics.com/blog + Follow Blog
The leader in dynamic authorization and Attribute Based Access Control (ABAC). This blog is on how externalized dynamic authorization can help you protect your most critical assets, and promote information sharing enterprise-wide.MORE Email ****@axiomatics.com
Facebook Followers 138Twitter Followers 2.4K Frequency 1 post/week Domain Authority 37 Read Now Get Email Contact
17. Identity Management Institute
Blog https://identitymanagementinstitute.org/featu.. + Follow Blog
This identity and access management blog posts identity management articles and cybersecurity news analysis by Identity Management Institute. Identity Management Institute (IMI) is the leading global certification organization serving professionals in identity governance, access management, and data protection. Since 2007, IMI certifications help global members advance in their careers and gain the trust of the business communities they serve with their identity and access management skills.MORE Email ****@theimi.org
Facebook Followers 372Twitter Followers 3.8K Frequency 1 post/week Domain Authority 40 Read Now Get Email Contact
18. Transmit Security Blog
Blog https://transmitsecurity.com/blog + Follow Blog
Discover the world of identity security, orchestration and authentication. Get IAM news, industry insights and Transmit Security product updates. The world's largest banks, insurers, healthcare providers, retailers and other leading brands rely on Transmit Security for smooth experiences that protect customers from fraud on every device and channel.MORE Email ****@transmitsecurity.com
Facebook Followers 437Twitter Followers 702Instagram Followers 592 Frequency 5 posts/month Domain Authority 42 Read Now Get Email Contact
19. EdTech Magazine » Identity Management
Blog https://edtechmagazine.com/k12/security/ident.. + Follow Blog
EdTech: Focus on K-12 explores technology and education issues that IT leaders and educators face when they're evaluating and implementing a solution. Follow the coverage to learn about the latest Identity Management in the ever-evolving world of cybersecurity.MORE Email ****@cdw.com
Frequency 1 post/month Domain Authority 63 Read Now Get Email Contact
20. Avancer Corporation Blog
Blog https://www.avancercorp.com/blog/ + Follow Blog
Get all the latest news, updates from the world of Identity & Access Management on Avancer's blog. Follow along to stay updated with latest news, tips & updates. Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004, it has over a decade's expertise in the field of Identity and Access Governance and IT Security.MORE Email ****@avancercorp.com
Twitter Followers 945 Frequency 1 post/month Domain Authority 29 Read Now Get Email Contact
21. BizTech Magazine » Identity Management
Blog https://biztechmagazine.com/security/identity.. + Follow Blog
BizTech explores technology and business issues that IT leaders and business managers face when they're evaluating and implementing a solution. BizTech is published by CDW. Explore more on identity management, cyber security, access management and more!MORE Email ****@cdw.com
Facebook Followers 116.6K Frequency 4 posts/quarter Domain Authority 60 Read Now Get Email Contact
22. Identity Defined Security Alliance Blog
Blog https://www.idsalliance.org/blog/ + Follow Blog
The Identity Defined Security Alliance (IDSA) provides free vendor-neutral education and resources that help organizations reduce the risk of a breach by combining identity and security strategies.MORE Twitter Followers 1.2K Frequency 1 post/month Domain Authority 37 Read Now Get Email Contact
23. HealthTech Magazine » Identity Management
Blog https://healthtechmagazine.net/security/ident.. + Follow Blog
HealthTech explores technology and healthcare issues - and shares success stories - relevant to IT leaders and managers at healthcare and senior care organizations evaluating and implementing solutions. HealthTech is published by CDW. Explore more about identity management issues in health industry, security measures and more!MORE Email ****@cdw.com
Facebook Followers 116.6K Frequency 1 post/quarter Domain Authority 54 Read Now Get Email Contact
24. Sennovate Blog
Blog https://sennovate.com/blog/ + Follow Blog
Learn more about data security and how we can make our data more secure with the help of Identity and Access Management solutions.
Email ****@sennovate.com
Twitter Followers 1.1K Frequency 4 posts/month Domain Authority 22 Read Now Get Email Contact
25. Curity Blog
Blog https://curity.io/blog/ + Follow Blog
Covers he latest news, product updates, and thoughts on identity and access management, and API security insights.
Email ****@curity.io
Twitter Followers 602 Frequency 6 posts/quarter Domain Authority 27 Read Now Get Email Contact
26. Evolveum - Identity Management and Identity Governance Blog
Blog https://evolveum.com/blog/ + Follow Blog
A must-follow open source Identity management and Identity governance blog by experts in the field.Evolveum is known for creating open identity & organization management and governance platform called midPoint. It is a combination of identity management and identity governance which cooperate seamlessly and this way create a complete solution covering both technological and business requirements of the organizations.MORE Email ****@evolveum.com
Facebook Followers 167Twitter Followers 226Instagram Followers 70 Frequency 4 posts/quarter Domain Authority 35 Read Now Get Email Contact
27. CionSystems Blog
Blog https://cionsystems.com/blog/ + Follow Blog
CionSystems is a company that provides solutions for securing and managing Active Directory (AD). CionSystems was founded to become the most comprehensive enterprise identity, access, and authentication management (IAM) solution provider in the world; with a laser focus on securing your active directoryMORE Email ****@cionsystems.com
Facebook Followers 3.3KTwitter Followers 169 Frequency 7 posts/year Domain Authority 28 Read Now Get Email Contact
28. Identity Underground
Blog https://identityunderground.wordpress.com/ + Follow Blog
My connector space to the internet metaverse (also my external memory, so I can easily share what I learn), where I share my opinions on identity access & management, enterprise security and more! With 20y experience, I built strong experience in enterprise security & architecture, identity & access management and many other security related fields.MORE Twitter Followers 622 Frequency 2 posts/quarter Domain Authority 13 Read Now Get Email Contact
29. IAMSE Blog
Blog https://iamse.blog/ + Follow Blog
This blog presents a series of articles on Identity and Access Management (IAM) written/curated/compiled by a passionate group of engineers, evangelists, and other interested parties. You will find identity-centric, technology-driven articles and IAM domain articles, some written here and others collected from different sites where they have been published.MORE Frequency 3 posts/month Domain Authority 1 Read Now Get Email Contact
30. Forgerock Blog
Blog https://www.pingidentity.com/en/resources/blo.. + Follow Blog
ForgeRock's Identity and Access Management Solutions helps their customers deepen their relationships with their consumers (CIAM), and improve the productivity and connectivity of their employees and partners (IAM).MORE Email ****@forgerock.com
Facebook Followers 2KTwitter Followers 11.6KInstagram Followers 894 Frequency 14 posts/year Domain Authority 62 Read Now Get Email Contact
31. Fraud and Identity in Focus
Blog https://blogs.lexisnexis.com/fraud-and-identi.. + Follow Blog
Fraud and Identity in Focus is a blog by LexisNexis that provides information about different Frauds and Identity Management. Gain insights from our fraud and identity experts who are on the frontlines of an ever-evolving fraud landscape.MORE Email ****@lexisnexisrisk.com
Facebook Followers 14KTwitter Followers 59.4K Domain Authority 77 Read Now Get Email Contact
32. SailPoint Blog
Blog https://www.sailpoint.com/blog/ + Follow Blog
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoints open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis.MORE Email ****@sailpoint.com
Facebook Followers 4.1KTwitter Followers 15.3KInstagram Followers 2K Frequency 30 posts/year Domain Authority 54 Read Now Get Email Contact
33. tuesdaynight
Blog https://www.tuesdaynight.org/ + Follow Blog
Learn more about Identity management, how it impacts business and more! Ian Glazer is the Vice President for Identity, Privacy, and Data Governance Product Management, at Salesforce.
Twitter Followers 6.5K Domain Authority 24 Read Now Get Email Contact
34. Oracle Cloud Security Blog » Identity and Access Management
Blog https://blogs.oracle.com/cloudsecurity/catego.. + Follow Blog
We're a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world's first - and only - autonomous database to help organize and secure our customers' data. Discover insights, news, updates and more on Identity and Access Management.MORE Facebook Followers 2.9MTwitter Followers 819.7K Frequency 9 posts/year Domain Authority 93 Read Now Get Email Contact
35. Security Magazine » Identity Management
Blog https://www.securitymagazine.com/topics/2233-.. + Follow Blog
Features and articles that focus on the way that security leaders identify individuals in their enterprises and control their access to particular areas. Security magazine is the security industry's go-to source for enterprise security trends, metrics, news and more! For more than 50 years, Security magazine has provided information on important enterprise security issues - including risk management, cybersecurity, and leadership and management and moreMORE Facebook Followers 10.8KTwitter Followers 28.2K Frequency 1 post/quarter Domain Authority 67 Read Now Get Email Contact
36. Entrust Blog » Identity & Access Management
Blog https://www.entrust.com/blog/category/identit.. + Follow Blog
Entrust provides proactive solutions that help organizations achieve and maintain compliance with legal and regulatory requirements around the world. As a pioneer in the business of issuing identities and securing transactions, Entrust is actively involved in defining industry standards and best practices. Explore more about Identity and access management, security, laws and more!MORE Email ****@entrustdatacard.com
Facebook Followers 4.5KTwitter Followers 6.4KInstagram Followers 1.1K Frequency 1 post/quarter Domain Authority 63 Read Now Get Email Contact
37. iWelcome Blog
Blog https://cpl.thalesgroup.com/blog + Follow Blog
iWelcome provides Identity & Access Management as a service (IDaaS). With iWelcomes cloud platform, organizations manage the identity lifecycle and access of their consumers, employees, business customers, partners and suppliers in a simple, secure and efficient manner.MORE Email ****@iwelcome.com
Facebook Followers 103Twitter Followers 1.1KInstagram Followers 64 Domain Authority 78 Read Now Get Email Contact
38. HID Global Blog
Blog https://www.hidglobal.com/blog + Follow Blog
HID powers the trusted identities of the world's people, places and things. Every day millions of people in more than 100 countries use our products and services to securely access physical and digital places. Over 2 billion things that need to be identified, verified and tracked are connected through HID Globals technology.MORE Email ****@hidglobal.com
Facebook Followers 7.5KTwitter Followers 11.9K Domain Authority 63 Read Now Get Email Contact
39. IDMWORKS Blog
Blog https://www.idmworks.com/blog/ + Follow Blog
IDMWORKS is an expert-level Identity and Access Management consultancy having successfully driven 600 IAM projects since 2004. IDMWORKS has been recognized for their leadership in security by Gartner and their consultants are true domain experts as recognized by their peers, customers and partners.MORE Email ****@idmworks.com
Facebook Followers 214Twitter Followers 541 Frequency 26 posts/year Domain Authority 37 Read Now Get Email Contact
40. Idenhaus Consulting Blog
Blog https://idenhaus.com/blog/ + Follow Blog
Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting, we help our clients solve their most challenging IT security problems and avoid the most common pitfalls.
Email ****@idenhaus.com
Facebook Followers 209Twitter Followers 2.9K Domain Authority 24 Read Now Get Email Contact
41. Saviynt Blog
Blog https://saviynt.com/blog + Follow Blog
Saviynt offers complete access governance and intelligence solutions for critical Data, Workloads, DevOps Resources, and Access to critical applications on Cloud and Enterprise. Saviynt combines granular application access, risk and usage analytics, real-time prevention with out-of-box risk signatures and SOD rules to address security & compliance needs for the enterprise.MORE Email ****@saviynt.com
Facebook Followers 813Twitter Followers 1K Frequency 19 posts/year Domain Authority 35 Read Now Get Email Contact
42. Ilantus Technologies Blog
Blog https://www.ilantus.com/blog/ + Follow Blog
ILANTUS, a cloud-based Identity as a Service vendor providing users a best Single Sign-On solution to access all their applications from anywhere.
Email ****@ilantus.com
Facebook Followers 211Twitter Followers 585 Domain Authority 28 Read Now Get Email Contact
43. Ilantus Technologies Blog
Blog https://www.ilantus.com/blog/ + Follow Blog
Ilantus Products is a pioneer in the Identity and Access Management domain since the last 19 years. Our products are a response to the market demand, which strive to provide feasible solutions to the customers. Our products are suitable for Fortune 500 companies as well as the mid-market, tailor-made to for each organization - backed by our extensive implementation experience.MORE Email ****@ilantus.com
Facebook Followers 210Twitter Followers 585 Domain Authority 28 Read Now Get Email Contact
44. Simeio Blog
Blog https://simeio.com/blogs/ + Follow Blog
Discover the people, processes and technology behind Simeio's managed identity and access management services. We help businesses reinvent how they engage with customers, how and where their employees work, and how they partner with others, securely and efficiently. Our goal is to help your business run your IAM program in the most effective way to maximize your investment in your digital transformation journey.MORE Email ****@simeio.com
Facebook Followers 1.1KTwitter Followers 1.1KInstagram Followers 515 Frequency 8 posts/year Domain Authority 30 Read Now Get Email Contact
45. Matt Flynn's Blog
Blog http://360tek.blogspot.com/ + Follow Blog
This is a personal blog, which reflects his own opinions and not those of Oracle, covers identity management and security, software, services, processes, and analyses. Matt Flynn is an information security and identity management specialist who works at Oracle.MORE Twitter Followers 1.5K Domain Authority 20 Read Now Get Email Contact
46. ProActive Solutions Blog » Identity and access management
Blog https://www.proactivesolutions.com/blog/topic.. + Follow Blog
From Cloud to Power to Software, ProActive has been delivering technology solutions to state and local governments, Fortune 500 companies, and start-up organizations for more than 20 years. In our blog, we want to share our decades of knowledge and resources.MORE Email ****@proactivesolutions.com
Twitter Followers 154 Frequency 1 post/year Domain Authority 21 Read Now Get Email Contact
47. Gangani Chamika
Blog http:// + Follow Blog
Read writing from Gangani Chamika on Medium about identity management, WSO2, how to manage and access identity and case studies.
Read Now Get Email Contact
48. Anuradha Karunarathna
Blog http:// + Follow Blog
Stories by Anuradha Karunarathna about identity management, ID management access and tools, security and more! Anuradha Karunarathna is Senior Software Engineer at WSO2 with computer engineering background.MORE Frequency 1 post/year Read Now Get Email Contact
Identity and Access Management Bloggers
Blogger Name | Designation | Blog Link | Twitter Handle | Twitter Follower | LinkedIn Profile | |
---|---|---|---|---|---|---|
Mike Costello | Writer | solutionsreview.com/identity-management | @infosec_review | 8.2K | https://www.linkedin.com/in/mike-costello-b18a0246/ | |
Rowena Bonnette | Vice President Of Digital Marketing & Author | avatier.com/blog | https://www.linkedin.com/in/rowenabonnette/ | |||
Nelson Cicchitto | CEO & Author | avatier.com/blog | https://www.linkedin.com/in/nelsoncicchitto/ | |||
Chloe Hartup | Digital Marketing Manager & Author | ubisecure.com/blog | https://www.linkedin.com/in/chloe-hartup/ | |||
Keith Uber | Vice President & Author | ubisecure.com/blog | https://www.linkedin.com/in/keithuber/ | |||
Oscar Santolalla | Senior Sales Engineer & Author | ubisecure.com/blog | https://www.linkedin.com/in/oscarsantolalla/ | |||
Francesca Hobson | Senior Marketing Manager & Author | ubisecure.com/blog | https://www.linkedin.com/in/francesca-hobson/ | |||
Steve Waite | Chief Marketing Officer & Author | ubisecure.com/blog | https://www.linkedin.com/in/stevewaite/ | |||
Darren Thomson | Vice President & Author | onelogin.com/blog | https://www.linkedin.com/in/darren-thomson-80092b1/ | |||
Max Shofron | Solution Engineer Team Lead & Author | onelogin.com/blog | https://www.linkedin.com/in/maxwellshofron/ | |||
Mark Cockbill | Senior Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/markcockbill/ | |||
Alicia Townsend | Product Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/alicia-townsend/ | |||
Jack Shepherd | Content Marketing Manager & Author | onelogin.com/blog | https://www.linkedin.com/in/jackpshepherd/ | |||
David Worthington | Blogger | jumpcloud.com/blog | https://www.linkedin.com/in/worthingtondavid/ | |||
Kate Lake | Content Writer | jumpcloud.com/blog | https://www.linkedin.com/in/kathryn-lake/ | |||
Oliver Wai | Head Of Product Marketing & Author | jumpcloud.com/blog | https://www.linkedin.com/in/oliverwai/ | |||
Kelsey Kinzer | Seo Content Manager & Author | jumpcloud.com/blog | https://www.linkedin.com/in/kelseykinzer/ | |||
Ryan Naraine | Editor At Large | securityweek.com/category/identity-access | @ryanaraine | 27K | https://www.linkedin.com/in/ryanaraine/ | |
Eduard Kovacs | Contributing Editor | securityweek.com/category/identity-access | @eduardkovacs | 13.9K | https://www.linkedin.com/in/eduard-kovacs-7b796134/ | |
Ionut Arghire | News Reporter | securityweek.com/category/identity-access | @ionutarghire | 1.2K | https://www.linkedin.com/in/ionut-arghire-92349a46/ | |
Ben Lebeaux | Director Of Communications & Author | rsa.com/blog | https://www.linkedin.com/in/ben-lebeaux-87236311/ | |||
Victoria Brown | Graphic Design Manager & Author | rsa.com/blog | https://www.linkedin.com/in/victoria-brown10/ | |||
Michael Nadeau | Executive Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/menadeau/ | |||
Andrew Flynn | Regional Executive Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/agflynn/ | |||
Samira Sarraf | Regional Editor | csoonline.com/in/category/identity-and-access-management | @samira_sarraf | 273 | https://www.linkedin.com/in/samirasarraf/ | |
Marc Ferranti | Executive Editor | csoonline.com/in/category/identity-and-access-management | @marcferranti | 543 | https://www.linkedin.com/in/marcferranti/ | |
Varun Aggarwal | News Editor | csoonline.com/in/category/identity-and-access-management | @aggarwalvarun | 2K | https://www.linkedin.com/in/varunaggarwal84/ | |
Lucian Constantin | Senior Writer | csoonline.com/in/category/identity-and-access-management | @lconstantin | 3.4K | https://www.linkedin.com/in/lconstantin/ | |
Edmund Kennedy | Australia Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/ed-kennedy-01 | |||
Xiou Ann Lim | Editor | csoonline.com/in/category/identity-and-access-management | https://www.linkedin.com/in/xiouann/ | |||
Amy Bennett | Executive Editor | csoonline.com/in/category/identity-and-access-management | @atbennett | 1.8K | https://www.linkedin.com/in/amytbennett/ | |
Diana McGhee | Author | blog.identityautomation.com | @dmmcghee | 2.2K | https://www.linkedin.com/in/dianamyersmcghee/ | |
George Wainblat | Director Of Product Management & Author | transmitsecurity.com/blog | https://www.linkedin.com/in/georgewainblat/ | |||
Ravit Aviv | Director Of Technology Alliances & Author | transmitsecurity.com/blog | https://www.linkedin.com/in/ravitaviv/ | |||
Ryan Petersen | Editor In Chief | edtechmagazine.com/k12/security/identity-management | @ryanpete | 2.5K | ||
Ricky Ribeiro | Editorial Director | edtechmagazine.com/k12/security/identity-management | @ricktagious | 2.7K | ||
Matt Mclaughlin | Associate Editorial Director | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Jean Dal Porto | Editorial Strategist | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | edtechmagazine.com/k12/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Jordan Scott | Senior Editor | edtechmagazine.com/k12/security/identity-management | @j_scott_writer | 367 | ||
Matt Mclaughlin | Associate Editorial Director | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Jean Dal Porto | Editorial Strategist | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | biztechmagazine.com/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Matt Mclaughlin | Associate Editorial Director | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/matt-mclaughlin-227b2b24/ | |||
Kelly Konrad | Associate Executive Editor | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/kelly-konrad-5941273/ | |||
Jean Dal Porto | Editorial Strategist | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/jeandalporto/ | |||
Teta Alim | Managing Editor | healthtechmagazine.net/security/identity-management | https://www.linkedin.com/in/tetaalim/ | |||
Anna Ogurekova | Marketing Director & author | evolveum.com/blog | https://www.linkedin.com/in/annaogurekova/ | |||
Veronika Kolpascikova | Digital marketing specialist & author | evolveum.com/blog | https://www.linkedin.com/in/veronikalatkova/ | |||
Katka Bolemant | Development Team Leader & author | evolveum.com/blog | https://www.linkedin.com/in/katarina-bolemant/ |