Identity and Access Management

Identity and Access Management | News, how-tos, features, reviews, and videos

VPN on iPhone
A binary mask.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Report: The state of secure identity 2022

New research from Okta’s Auth0 access management platform found that credential stuffing and fraudulent registration attacks are on the rise.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

Hands type on a laptop keyboard.

Recommended security resources for Microsoft Active Directory

These resources will keep you up to date on how to best protect your Active Directory domains.

enter neon sign do not tresspass privacy authentication access barbed wire by clem onojeghuo unspla

Intro to crypto wallet authentication

A blockchain enabled cybersecurity future is coming fast, with crypto wallets set to become a central authentication mechanism.

password azure protection security policy

How Azure Active Directory opens new authentication risks

Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.

Identity access management  >  abstract network connections and circuits reflected in eye

Remediant wants to move beyond PAM to secure enterprise networks

Remediant created its new PAM+ strategy to help negate credential-based compromises, protect access and accelerate Zero Trust initiatives.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

Dashlane launches integrated passkey support for password manager with new in-browser passkey solution

Dashlane's passkey support allows users to authenticate to their password vaults without a password.

zero trust security model secured network picture id1313494602

Sorting zero-trust hype from reality

Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Identity management difficulties continue to plague IT departments

Centralizing and managing identity data remains a low priority for many IT decision-makers, according to a new study.

stephanie franklin thomas 1200x800

How ABM built a cohesive security program around zero trust

CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.

Zero-trust

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

Handshake, mergers and acquisitions, M &A

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Private equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Teleport features passwordless access with new access plane update

With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.

Conceptual image of a password amid hexadecimal code.

Passwordless company claims to offer better password security solution

Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?

Load More
You Might Also Like