Author: Thomas Edgerton

Thomas Edgerton, Avatier's MVP award-winning Market Analyst and Performance Consultant in information technology, IT security, instructional technology and human factors, blogs on topics ranging from leadership to national security, innovation and deconstructing the future.​

Verizon Data Breach Investigations Report and Recommended Security Controls

Verizon Data Breach Investigations Report and Recommended Security Controls

Gartner Identity and Access Management for Third Parties

Gartner Identity and Access Management for Third Parties

Uncovering and Recovering from Medical Identity Theft

Uncovering and Recovering from Medical Identity Theft

The Panama Papers Represent Failed Leadership and Information Security Controls

The Panama Papers Represent Failed Leadership and Information Security Controls

FBI Charges State Sponsored Hackers Target Organizations with Weak Password Policies

FBI Charges State Sponsored Hackers Target Organizations with Weak Password Policies

The Force Awakens and the Gartner Identity Governance & Administration Magic Quadrant

The Force Awakens and the Gartner Identity Governance & Administration Magic Quadrant

Verizon Data Breach Scenarios Stress Identity Management with Multi-Factor Authentication

Verizon Data Breach Scenarios Stress Identity Management with Multi-Factor Authentication

Extended Enterprise Security Risks Countered by Access Management

Extended Enterprise Security Risks Countered by Access Management

2016 Cyberthreat Defense Report Points to Identity and Access Management as Essential to Controlling IT Security Risks

2016 Cyberthreat Defense Report Points to Identity and Access Management as Essential to Controlling IT Security Risks

Principles of Access Management Control

Principles of Access Management Control