Identity and Access Management

Identity and Access Management | News, how-tos, features, reviews, and videos

access control / authentication / privileges / security
Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

A vast network of identity avatars. [identity management]

IDaaS explained: How it compares to IAM

IDaaS is a cloud-based consumption model for IAM. It offers cost, scalability, and other advantages, but it also comes with its own risks.


How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

Industry 4.0 / Industrial IoT / Smart Factory / robotics / automation

NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines

Vendor claims to be the first to offer device-level protection solutions designed for legacy and new industrial machinery and smart factory production lines.

digital identity / authentication

Open-source standard aims to unify incompatible cloud identity systems

The project uses open source tech and a new common policy format to manage identity access policies across multi-clouds, on-premises systems, and vendors.

An anonymous hooded figure is surrounded by an abstract network of avatars.

ForgeRock offers AI-based solution for identity-based cyberattacks

ForgeRock Autonomous Access is designed to eliminate account takeovers and prevent fraud in real-time, using a combination of AI and advanced pattern recognition.

digital identity / authentication

Apple, Google, Microsoft expand support for FIDO passwordless sign-in standard

The tech giants commit to expanded support for FIDO passwordless standard that the firms say will allow faster, easier and more secure sign-ins across leading devices and platforms.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

The new cybersecurity mandate

Parsing the White House’s cybersecurity directives.

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

9 top identity and access management tools

Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

GitHub to mandate 2FA for all code contributors by 2023

The world’s largest development platform will require all code-contributing users to enroll in two-factor authentication by the end of 2023 to enhance software supply chain security.

abstract face / digital identity

Firms struggling with non-person identities in the cloud

Enterprises turning to cloud identity governance, cloud infrastructure entitlements management. and AI-driven investigation, behavioral detection programs to treat cloud security ailments.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

10 most common MFA excuses, and how to answer them

CISOs often meet resistance to multi-factor authentication from users, management, and even IT. Here's how to counter their complaints.

sdn software defined network architecture

New SDP 2.0 specification facilitates zero-trust maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

close up of hands on a computer keyboard coding programming software picture id1205339069

GitHub repositories compromised by stolen OAuth tokens

GitHub, Salesforce warn of data theft from private code repositories.

Artificial intelligence and digital identity

Ballooning growth of digital identities exposing organizations to greater cybersecurity risk

New enterprise initiatives are driving up the number of human and digital identities, increasing security risks.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

It's time to re-evaluate your 2FA setup on Microsoft networks

Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?

Thoma Bravo's $6.9B SailPoint deal brings IAM to security portfolio

SailPoint's IAM (identity access management) capabilities fill a gap in private equity firm Thoma Bravo's cybersecurity portfolio.

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

99% of cloud identities are overly permissive, opening door to attackers

Palo Alto Unit 42 report highlights five threat groups targeting cloud infrastructure and reveals their credential-focused attack methods.

Load More