Six Essential IAM Policies Every Business Needs

Six Essential IAM Policies Every Business Needs (Beyond Passwords) TL;DR If your security program starts and ends with a password policy, your business is exposed. To defend against breaches, insider threats, and regulatory penalties, you need a well-rounded suite of Identity & Access Management (IAM) policies—clear, actionable rules that leave no gaps for attackers (or auditors) to exploit. This post breaks down six foundational IAM policies, when to use them, why they matter, and how to link them together for real-world protection....

August 13, 2025 · 5 min · Jay Klinkowsky

Access Reviews & Certifications: Why and How

Access Reviews & Certifications: Why and How Everything you need to know about periodic reviews, compliance value, and common traps to avoid TL;DR Access reviews and certifications are your IAM safety net. Done right, they ensure that users have only the access they need—no more, no less. In this post, we’ll explain the what, why, and how, along with real-world examples and common mistakes to avoid. What Are Access Reviews?...

August 6, 2025 · 3 min · Jay Klinkowsky

AI + Human-in-the-Loop IAM: Compliance Mapping Guide

AI + Human-in-the-Loop IAM: Compliance Mapping Guide Introduction This guide maps how AI-driven IAM—with human-in-the-loop—meets the world’s leading security compliance frameworks. Use this as a reference for your governance and audit strategies. SOX (Sarbanes-Oxley) Key Controls: Change management for financial systems, privileged access approval, audit logs. HiTL Mapping: All privileged access changes require manual sign-off. Maintain full, immutable logs of both automated and human actions. HIPAA (Health Insurance Portability and Accountability Act) Key Controls: Controls for PHI, traceability of access, breach notification....

June 12, 2025 · 2 min · Jay Klinkowsky

The Hidden Dangers of AI in Receipts and Identity Workflows

From self-generating invoices to automated ID verification, AI is quickly becoming a foundational tool in business operations, security protocols, and digital transactions. Organizations use AI to process documents, detect anomalies, and streamline workflows—boosting speed and reducing human error. But there’s a darker side. When these systems are deployed without adequate oversight, they can be exploited by threat actors or produce flawed outcomes at scale. This blog post explores how AI-generated receipts and identity automation can lead to data fraud, compliance violations, and systemic vulnerabilities—especially in the absence of human checks and balances....

April 16, 2025 · 8 min · Jay Klinkowsky

AI and PII: The Privacy Risks You Can't Ignore in 2025

In today’s digital age, artificial intelligence (AI) has become increasingly mainstream, shaping everything from how we search online to how we interact with technology daily. However, as AI grows more prevalent, concerns about privacy, particularly regarding personally identifiable information (PII), have emerged as critical issues that users must understand. Mainstream AI tools, such as conversational AI assistants (e.g., ChatGPT, Google Bard) and generative AI platforms (e.g., Midjourney, DALL-E), rely heavily on data gathered from the internet....

March 30, 2025 · 4 min · Jay Klinkowsky