newsGathid’s new access mapping tech promises affordable and streamlined IAMThrough the directed graph model technology, Gathid will provide organizations with a detailed, real-time inventory of their identities and permissions.By Shweta SharmaApr 10, 20243 minsIdentity and Access ManagementSecurity Software news analysis Google Chrome aims to solve account hijacking with device-bound cookiesBy Lucian ConstantinApr 05, 20248 minsBrowser SecurityInternet SecurityIdentity and Access Managementfeature What is identity fabric immunity? Abstracting identity for better securityBy Matthew TysonApr 03, 202411 minsCSO and CISOApplication SecurityIdentity and Access Management newsTelesign launches integrated API to combine traditional identity verification channels By Shweta Sharma Mar 27, 20243 minsAuthenticationIdentity and Access ManagementSecurity Software featureRedefining multifactor authentication: Why we need passkeysBy Joe Stocker Mar 15, 20248 minsMulti-factor AuthenticationAuthenticationIdentity and Access Management featureHow to strengthen your Kubernetes defensesBy David Strom Feb 13, 20248 minsDevSecOpsApplication SecurityIdentity and Access Management newsCisco’s identity and access security offerings to receive AI upgradesBy Shweta Sharma Feb 06, 20243 minsIdentity and Access Management featureProtecting Windows networks: Get back to basics for the new yearBy Susan Bradley Jan 09, 20246 minsPasswordsWindows SecurityIdentity and Access Management newsAmazon debuts biometric security device, updates Detective and GuardDutyBy Jon Gold Nov 29, 20233 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management ArticlesfeatureThe alarming rise of quishing is a red flag for CISOsMultiple reports show a dramatic rise in phishing scams employing QR codes. Now is the time for security leaders to take proactive steps.By Matthew Tyson Nov 21, 2023 8 minsPhishingIdentity and Access ManagementSecurity PracticesopinionThe SSO tax is killing trust in the security industryApplication providers charge fees to implement single sign-on but don't deliver a full SSO experience. Threat actors are taking advantage of the situation.By Joe Sullivan and Atul Tulshiibagwale Nov 21, 2023 10 minsAuthenticationSingle Sign-onIdentity and Access ManagementfeatureAs perimeter defenses fall, the identify-first approach steps into the breachMore security chiefs are seeking to make identity a centerpiece of their security programs, but challenges persist.By Mary Pratt Nov 14, 2023 9 minsCSO and CISOZero TrustIdentity and Access ManagementfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance Nov 08, 2023 8 minsCSO and CISOCloud SecurityData and Information SecuritynewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold Nov 07, 2023 3 minsInternet SecurityIdentity and Access ManagementPrivacynewsFrontegg releases new identity, user management solution for SaaS productsFrontegg Forward delivers four fundamental user identity management innovations for SaaS vendors.By Michael Hill Nov 07, 2023 4 minsAuthenticationAccess ControlIdentity Management SolutionsnewsTeleport’s new offering to help reduce attack response timesThe identity governance and security offering will automate access requests, detect weak access patterns, and help with incident response.By Shweta Sharma Oct 26, 2023 3 minsIdentity and Access ManagementnewsOkta support system breach highlights need for strong MFA policiesBreach was detected and blocked before it granted access to attackers due to the enforcement of multifactor authentication.By Lucian Constantin Oct 23, 2023 4 minsMulti-factor AuthenticationData BreachIdentity and Access ManagementnewsMost organizations globally have implemented zero trustZero-trust adoption is growing according to a recent report from Okta that found 61% of organizations have already implemented a zero-trust initiative.By Samira Sarraf Oct 18, 2023 4 minsAuthenticationZero TrustIdentity and Access ManagementfeatureOnly you can prevent forest trust issues: managing the complexity of merged networksWhen two companies merge, a top-to-bottom assessment of settings for Active Directory forests with trusts can eliminate headaches and create a more secure environmentBy Susan Bradley Oct 11, 2023 7 minsActive DirectoryMergers and AcquisitionsData and Information SecuritynewsVeza releases new IGA solution to enhance identity securityThe solution manages access authorization based on roles and permissions, not users or groups.By Michael Hill Oct 10, 2023 4 minsAuthenticationAccess ControlIdentity and Access ManagementfeatureWhat is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management?By Matthew Tyson Sep 26, 2023 12 minsCryptocurrencyAuthenticationIdentity Management Solutions Show more Show less View all Resources whitepaper Zero Trust and Identity & Access Control in the Purdue Model Securing communication between OT and IT systems is a complex task with challenges arising from legacy systems, differing security approaches, real-time demands, lack of standardization, and complex assets. The post Zero Trust and Identity & Access Control in the Purdue Model appeared first on Whitepaper Repository –. By Corsha, Inc. 14 May 2024Data and Information SecurityIdentity and Access ManagementSecurity View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Kroll cyber threat landscape report: AI assists attackers By Lynn Greiner May 24, 20244 mins Threat and Vulnerability ManagementCybercrimeVulnerabilities news analysis Windows Recall — a ‘privacy nightmare’? By Matthew Finnegan May 24, 20241 min Privacy feature What is spear phishing? Examples, tactics, and techniques By Josh Fruhlinger May 24, 202414 mins PhishingCyberattacksFraud podcast CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International May 22, 202426 mins CSO and CISO podcast CSO Executive Sessions: The personality of cybersecurity leaders Apr 29, 202419 mins CSO and CISO podcast CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 02, 202416 mins CSO and CISO video CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International May 22, 202426 mins CSO and CISO video CSO Executive Sessions: The personality of cybersecurity leaders Apr 29, 202419 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 01, 202416 mins CSO and CISO