<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1838014323211965&amp;ev=PageView&amp;noscript=1">

Blogs



Your go-to resource for navigating the challenges of disconnected applications and enhancing security automation. Dive into actionable advice, innovative solutions, and the latest cybersecurity trends to keep your enterprise secure and ahead of the curve.

Cerby-Wifi-logo
Cerby-megaphone-logo
Cerby-messages-logo
Cerby-Blog-Giro
Cerby blog
| Feb 10, 2025
We’re thrilled to introduce Cerby’s secure, developer-friendly public APIs, a major step forward in automating security for disconnected applications. Managing applications that don’t support common integration standards such as SAML and SCIM, has long...
Cerby blog
| Feb 5, 2025
Agentic AI in Cybersecurity: Part 1 - Transforming Identity Security by Closing the “Last Mile” As SaaS adoption expands, organizations face an increasingly complex challenge in managing identities across applications, systems, and users. Identity...
Cerby blog
| Jan 27, 2025
As we head into 2025, big changes in technology are pushing both private and public sector leaders to adapt quickly. Rapid progress in AI, cybersecurity, and digital identity is reshaping how we operate and secure sensitive information.
Cerby blog
| Jan 1, 2025
As we step into the new year, fresh opportunities to grow your brand’s social media presence are everywhere. But with digital growth comes complexity—and risks. Managing various platforms and hundreds of accounts across teams, agencies, and contractors...
Cerby blog
| Dec 10, 2024
In today's rapidly evolving digital landscape, organizations face a growing challenge: extending Identity Governance and Administration (IGA), Privileged Access Management (PAM), and Application Access Governance to their entire application ecosystem....
Cerby blog
| Nov 23, 2024
We’re excited to announce that we'll be at Gartner IAM! We look forward to meeting with customers, partners, and industry experts at “the premier conference to help IAM and security leaders tasked with safeguarding digital identity, business enablement...
iam
Cerby blog
| Nov 18, 2024
Disconnected apps challenge a Zero trust (ZT) strategy, mainly because they fall outside centralized identity management systems like Okta and Entra ID. In the first blog of this two part series, we explored the security risks that disconnected...
Cerby blog
| Oct 28, 2024
Social media has become one of the most powerful channels for growing brand awareness, building customer relationships, and driving engagement. Gary Vaynerchuck has said that, “Social media is today's word of mouth. If you're not building a brand on...
Security, Social Media
Cerby blog
| Oct 24, 2024
Collaborating with agencies to manage your social media presence can be a game-changer for your brand, but it also comes with a unique set of challenges. You need to give them the access they need to post content, run campaigns, and engage with your...
Social Media
Cerby blog
| Oct 21, 2024
Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless...
Zero Trust, cybersecurity
Cerby blog
| Oct 8, 2024
Learn how automation can save your team hours
identity, Social Media