

Ericka Chickowski
CSO contributor
An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. She has focused on cybersecurity for over 15 years and keeps her finger on the pulse of the most relevant trends in cybersecurity.

9 top identity and access management tools
Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.