opinionReduce security risk with 3 edge-securing stepsNot sure where you should start to approach risk reduction in your network? If you aren’t aware of any and all risks to your edge access, you’re not reducing risk. By Susan BradleyJul 01, 20246 minsIdentity and Access ManagementRisk Management news Microsoft-owned vendor blamed for massive healthcare breachBy Shweta SharmaJun 26, 20243 minsData BreachIdentity and Access Managementfeature What are non-human identities and why do they matter?By Chris HughesJun 03, 20248 minsAccess ControlIdentity and Access ManagementNetwork Security newsOkta alerts customers against new credential-stuffing attacksBy Shweta Sharma May 31, 20244 minsIdentity and Access ManagementVulnerabilities newsGathid’s new access mapping tech promises affordable and streamlined IAMBy Shweta Sharma Apr 10, 20243 minsIdentity and Access ManagementSecurity Software news analysisGoogle Chrome aims to solve account hijacking with device-bound cookiesBy Lucian Constantin Apr 05, 20248 minsBrowser SecurityInternet SecurityIdentity and Access Management featureWhat is identity fabric immunity? Abstracting identity for better securityBy Matthew Tyson Apr 03, 202411 minsCSO and CISOApplication SecurityIdentity and Access Management newsTelesign launches integrated API to combine traditional identity verification channels By Shweta Sharma Mar 27, 20243 minsAuthenticationIdentity and Access ManagementSecurity Software featureRedefining multifactor authentication: Why we need passkeysBy Joe Stocker Mar 15, 20248 minsMulti-factor AuthenticationAuthenticationIdentity and Access Management ArticlesfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom Feb 13, 2024 8 minsDevSecOpsApplication SecurityIdentity and Access ManagementnewsCisco’s identity and access security offerings to receive AI upgradesNew AI-powered identity visibility, along with a few other AI advancements, is expected to improve Cisco’s existing security offerings.By Shweta Sharma Feb 06, 2024 3 minsIdentity and Access ManagementfeatureProtecting Windows networks: Get back to basics for the new yearWhile it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place. By Susan Bradley Jan 09, 2024 6 minsPasswordsWindows SecurityIdentity and Access ManagementnewsAmazon debuts biometric security device, updates Detective and GuardDutyAmazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities.By Jon Gold Nov 29, 2023 3 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability ManagementfeatureThe alarming rise of quishing is a red flag for CISOsMultiple reports show a dramatic rise in phishing scams employing QR codes. Now is the time for security leaders to take proactive steps.By Matthew Tyson Nov 21, 2023 8 minsPhishingIdentity and Access ManagementSecurity PracticesopinionThe SSO tax is killing trust in the security industryApplication providers charge fees to implement single sign-on but don't deliver a full SSO experience. Threat actors are taking advantage of the situation.By Joe Sullivan and Atul Tulshiibagwale Nov 21, 2023 10 minsAuthenticationSingle Sign-onIdentity and Access ManagementfeatureAs perimeter defenses fall, the identify-first approach steps into the breachMore security chiefs are seeking to make identity a centerpiece of their security programs, but challenges persist.By Mary K. Pratt Nov 14, 2023 9 minsCSO and CISOZero TrustIdentity and Access ManagementfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance Nov 08, 2023 8 minsCSO and CISOCloud SecurityData and Information SecuritynewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold Nov 07, 2023 3 minsInternet SecurityIdentity and Access ManagementPrivacynewsFrontegg releases new identity, user management solution for SaaS productsFrontegg Forward delivers four fundamental user identity management innovations for SaaS vendors.By Michael Hill Nov 07, 2023 4 minsAuthenticationAccess ControlIdentity Management SolutionsnewsTeleport’s new offering to help reduce attack response timesThe identity governance and security offering will automate access requests, detect weak access patterns, and help with incident response.By Shweta Sharma Oct 26, 2023 3 minsIdentity and Access ManagementnewsOkta support system breach highlights need for strong MFA policiesBreach was detected and blocked before it granted access to attackers due to the enforcement of multifactor authentication.By Lucian Constantin Oct 23, 2023 4 minsMulti-factor AuthenticationData BreachIdentity and Access Management Show more Show less View all Resources whitepaper Zero Trust and Identity & Access Control in the Purdue Model Securing communication between OT and IT systems is a complex task with challenges arising from legacy systems, differing security approaches, real-time demands, lack of standardization, and complex assets. The post Zero Trust and Identity & Access Control in the Purdue Model appeared first on Whitepaper Repository –. By Corsha, Inc. 14 May 2024Data and Information SecurityIdentity and Access ManagementSecurity View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO