<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1838014323211965&amp;ev=PageView&amp;noscript=1">

Blogs



Your go-to resource for navigating the challenges of disconnected applications and enhancing security automation. Dive into actionable advice, innovative solutions, and the latest cybersecurity trends to keep your enterprise secure and ahead of the curve.

Cerby-Wifi-logo
Cerby-megaphone-logo
Cerby-messages-logo
Cerby-Blog-Giro
Cerby blog
| Mar 24, 2025
Across most organizations, credentials live in too many places—spreadsheets, browser folders, and legacy password managers. Each one managed by a different team, creating sprawl that’s not just clutter—but risk.
Cerby blog
| Mar 17, 2025
The Only Identity Security Automation Platform for Disconnected Apps Your identity tools don’t cover every app—but they should. Disconnected apps—those without APIs, standard integrations, or locked behind costly SSO paywalls—are one of the biggest...
Cerby blog
| Mar 7, 2025
In Part 1, we explored how Agentic AI is beginning to transform identity security by addressing IAM’s “last mile” problem—the critical gap in managing disconnected applications, automating manual processes, and securing identity configurations.
Cerby blog
| Feb 26, 2025
Cerby and Okta are showcasing an innovative collaboration that marks a significant milestone in enterprise security. This innovative solution aims to revolutionize how enterprises manage user sessions across web and mobile applications. With this...
Cerby blog
| Feb 24, 2025
Enterprise security depends on controlling who has access to what—and for how long. But most apps—whether SaaS, legacy, or homegrown—don’t support APIs or SCIM (System for Cross-domain Identity Management). Without these integration standards, identity...
Cerby blog
| Feb 10, 2025
We’re thrilled to introduce Cerby’s secure, developer-friendly public APIs, a major step forward in automating security for disconnected applications. Managing applications that don’t support common integration standards such as SAML and SCIM, has long...
Cerby blog
| Feb 5, 2025
Agentic AI in Cybersecurity: Part 1 - Transforming Identity Security by Closing the “Last Mile” As SaaS adoption expands, organizations face an increasingly complex challenge in managing identities across applications, systems, and users. Identity...
Cerby blog
| Jan 27, 2025
As we head into 2025, big changes in technology are pushing both private and public sector leaders to adapt quickly. Rapid progress in AI, cybersecurity, and digital identity is reshaping how we operate and secure sensitive information.
Cerby blog
| Jan 1, 2025
As we step into the new year, fresh opportunities to grow your brand’s social media presence are everywhere. But with digital growth comes complexity—and risks. Managing various platforms and hundreds of accounts across teams, agencies, and contractors...
Cerby blog
| Dec 10, 2024
In today's rapidly evolving digital landscape, organizations face a growing challenge: extending Identity Governance and Administration (IGA), Privileged Access Management (PAM), and Application Access Governance to their entire application ecosystem....
Cerby blog
| Nov 23, 2024
We’re excited to announce that we'll be at Gartner IAM! We look forward to meeting with customers, partners, and industry experts at “the premier conference to help IAM and security leaders tasked with safeguarding digital identity, business enablement...
iam
Cerby blog
| Nov 18, 2024
Disconnected apps challenge a Zero trust (ZT) strategy, mainly because they fall outside centralized identity management systems like Okta and Entra ID. In the first blog of this two part series, we explored the security risks that disconnected...
Cerby blog
| Oct 28, 2024
Social media has become one of the most powerful channels for growing brand awareness, building customer relationships, and driving engagement. Gary Vaynerchuck has said that, “Social media is today's word of mouth. If you're not building a brand on...
Security, Social Media
Cerby blog
| Oct 24, 2024
Collaborating with agencies to manage your social media presence can be a game-changer for your brand, but it also comes with a unique set of challenges. You need to give them the access they need to post content, run campaigns, and engage with your...
Social Media
Cerby blog
| Oct 21, 2024
Zero trust (ZT) works when deployed consistently, but you can’t apply it to apps that are disconnected from your identity infrastructure. When we think of enterprise apps, we often focus on major SaaS apps like M365 and SalesForce. However, countless...
Zero Trust, cybersecurity
Cerby blog
| Oct 8, 2024
Learn how automation can save your team hours
identity, Social Media
Cerby blog
| Oct 7, 2024
Avoid lockouts and keep your social media accounts secure and always on with Cerby
Social Media
Cerby blog
| Sep 30, 2024
Introducing our 5-part series: Protect your brand on social media Managing social media access shouldn’t mean juggling passwords, hunting down who has access, or constantly worrying about security. For many marketers, these challenges slow down...
Social Media, Sharing Passwords
Cerby blog
| Sep 18, 2024
We’re excited to announce that we'll be at Oktane 2024! We look forward to meeting with customers, partners, and industry experts at “the biggest Identity event of the year”!
oktane, identity
Cerby blog
| Jul 24, 2024
Introduction Recently our team had the opportunity to spend time with much of the identity security community at the 2024 #Identiverse at the Aria in Las Vegas. The Aria, by far, has to be my favorite hotel for events in Las Vegas. Identiverse 2024...
Company
Cerby blog
| Jul 9, 2024
As Cerby advances and transforms, our brand must reflect our bold vision. Today, we are thrilled to share Cerby’s new brand identity which emphasizes our commitment to modernizing identity security in the digital world.
Company
Cerby blog
| Jul 9, 2024
68%! According to Verizon’s most recent Data Breach and Incidents Report released this summer, 68% is the percentage of data breaches attributed to what they call the ‘human element.’ What this really means is that credential issues related to web,...
Cerby blog
| May 21, 2024
Tackling the Last Mile Problem in Zero Trust In cybersecurity, the last mile problem continues to challenge organizations striving to implement a comprehensive zero trust strategy. Nonstandard and disconnected applications often fall outside the scope of...
Industry insights, Zero Trust
Cerby blog
| Jan 19, 2024
Zero Trust is gaining momentum. Through top-down implementation and the proper incentives, we’ll see more international governments begin to adopt Zero Trust policies in the coming year.
Industry insights, Zero Trust
Cerby blog
| Dec 8, 2023
In cybersecurity, the Healthcare and Public Health (HPH) sector faces an ever-evolving array of threats. The notorious Clop ransomware group has recently made headlines, targeting organizations with sophisticated attacks. These incidents underscore the...
Company
Cerby blog
| Nov 13, 2023
Alameda, CA – November 13, 2023 – Cerby, the comprehensive access management platform for nonstandard applications, announced today that CRN®, a brand of The Channel Company, has named Cerbyto its 2023 Stellar Startups list in the Security category. This...
Company
Cerby blog
| Nov 10, 2023
In the digital age, social media platforms have become the epicenters of political discourse, making their security a matter of national importance, especially as the US gears up for the November 2023 elections. Our latest research sheds light on the...
Company
Cerby blog
| Nov 7, 2023
Alameda, CA – November 7, 2023 –Cerby, the comprehensive access management platform for nonstandard applications, today announced its newest report, Threat Briefing: Social Media Security and Elections Volume II, a year-over-year analysis and research...
Company, Press release
Cerby blog
| Oct 3, 2023
ALAMEDA, CA – October 3, 2023 – Cerby, the comprehensive access management platform for nonstandard applications, today announced a partnership with the World’s Identity Company, Okta. Cerby's partnership with Okta expands the reach of Okta's...
Company, Partners
Cerby blog
| Aug 22, 2023
Led by Two Sigma Ventures with significant participation from Outpost Ventures.
Company, Press release
Cerby blog
| Aug 22, 2023
Cerby raises $17M to mitigate the risks of nonstandard applications. Get a demo. What if you could lower your risk of breach by upwards of 15% without adding a single person to your security team?
Company, Press release
Cerby blog
| Aug 9, 2023
As the temperature rises and summer starts to fade away, children eagerly head back to school while others plead with their parents for a few more days of fun in the sun. Meanwhile, our team is busy finalizing plans to meet you at some exciting events...
Company
Cerby blog
| Jul 18, 2023
In this Part 3 of a series examining Zero Trust in more detail, John provides an in-depth view of the fourth and fifth steps in implementing Zero Trust architecture — creating policy and monitoring and maintaining the environment.
Security, Zero Trust
Cerby blog
| May 25, 2023
In this Part 2 of a series examining Zero Trust in more detail, the creator of Zero Trust, John Kindervag, provides an in-depth view of the second and third steps in implementing Zero Trust architecture — mapping transaction flows and defining the...
Security, Zero Trust
Cerby blog
| Apr 24, 2023
Unearthing the truth behind nonfederated applications through independent research.
Industry insights
Cerby blog
| Apr 14, 2023
Zero Trust is a journey and is not something you can buy from a vendor.
Industry insights
Cerby blog
| Apr 13, 2023
Today, we are thrilled to announce our new partnership with Khoros, which allows brands to launch, manage, and secure their social media profiles quickly in coordination with the Khoros platform. Social media applications have traditionally been...
Company
Cerby blog
| Mar 28, 2023
As a creative professional, you likely use Adobe's suite of products to produce top-quality designs, illustrations, videos, and more. While Adobe's software is indispensable for creating stunning visual content, Adobe account management for teams,...
Automation
Cerby blog
| Mar 28, 2023
Digital marketing in the post-pandemic era has become more complex and extensive. One of the most significant factors to consider is access management regarding multiple social media accounts you manage on your company's behalf.
Security
Cerby blog
| Mar 28, 2023
As more applications move to the cloud, Single Sign-On (SSO) has become a popular way to simplify user authentication across multiple services. Instead of remembering multiple usernames and passwords, users can log in once and access all of their...
Industry insights
Cerby blog
| Mar 28, 2023
Security, Zero Trust
Cerby blog
| Mar 9, 2023
With these five simple steps, learn how to secure your social media accounts and keep your brand safe from security threats.
Security
Cerby blog
| Feb 22, 2023
An enforcement-based approach to security
Security
Cerby blog
| Feb 15, 2023
Enterprise Password Managers primarily exist because so few apps support standards like SSO and SCIM. We are changing that at Cerby.
Industry insights
Cerby blog
| Jan 11, 2023
Cerby's research shows that employee application choice is intimately tied to how people get their work done and their job satisfaction levels.
Company
Cerby blog
| Nov 16, 2022
I am excited to announce that John Kindervag, the creator of Zero Trust and one of the world’s foremost cybersecurity experts, has joined our Advisory Board. In this role, John will help us focus our efforts on some of the greatest dangers in the IT...
Company
Cerby blog
| Nov 10, 2022
Social media impact on the U.S. politics
Industry insights
Cerby blog
| Sep 26, 2022
Employer perceptions about applications used for work and the reality of the employees using them differ. According to our research, 92% of employees want full control over decisions about applications used for work. Because the applications employees...
Security
Cerby blog
| Sep 15, 2022
When the pandemic hit, existing workplace practices and operations began an immediate transformation. Now, as we enter a post-pandemic era, we can begin to assess how organizations and their employees both fared and altered.
Company
Cerby blog
| Sep 12, 2022
Application choice: choosing the productivity and efficiency applications of your choice without security or IT approval in the workplace. Today, the majority of employees want full control over application choice, but many of those applications aren’t...
Security
Cerby blog
| Sep 6, 2022
Unmanageable applications: a new category of applications becoming increasingly challenging for businesses to manage and secure effectively, yet increasingly critical for businesses to succeed. Today, most organizations use apps to streamline processes...
Security
Cerby blog
| Aug 31, 2022
The COVID hangover: the lingering effects of a “make it work” mentality organizations adopted in response to the COVID-19 pandemic.
Industry insights
Cerby blog
| Aug 22, 2022
How employees use applications for work is changing. In the wake of COVID-19, the shift to remote work and rapid digitization empowered people to work however they wanted. Left to their own devices, employees started using the applications they...
Security
Cerby blog
| Aug 3, 2022
What are unmanageable applications? Unmanageable applications are a class of applications defined by their lack of support for common identity and security standards. While Shadow IT can refer to any application used without IT and security approval,...
Security
Cerby blog
| Jul 8, 2022
One of the biggest challenges marketers often face is protecting their ad spend across social media.
Security
Cerby blog
| Jun 27, 2022
Today, we are announcing a milestone in our journey: a $12 million seed funding round from Ridge Ventures, Bowery Capital, Okta Ventures, Salesforce Ventures, and others, bringing total funding to $15.5 million. Approaches for dealing with shadow IT are...
Security
Cerby blog
| Jun 27, 2022
How does it make you feel when you are told you can only do something only if you do it a certain way with a very defined set of tools? If you are like me, you probably don’t like it, and it might even leave you feeling like you aren’t trusted. Welcome...
Security