Identity and Access Management

Identity and Access Management | News, how-tos, features, reviews, and videos

zero trust security model secured network picture id1313494602

Sorting zero-trust hype from reality

Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Identity management difficulties continue to plague IT departments

Centralizing and managing identity data remains a low priority for many IT decision-makers, according to a new study.

stephanie franklin thomas 1200x800

How ABM built a cohesive security program around zero trust

CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.

Zero-trust

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

Handshake, mergers and acquisitions, M &A

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Private equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Teleport features passwordless access with new access plane update

With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.

Conceptual image of a password amid hexadecimal code.

Passwordless company claims to offer better password security solution

Stytch's business is getting rid of passwords so why is it trying to "modernize" their use?

Admission tickets in an digital network / access / admittance / authorization / authentication

Auth0’s OpenFGA explained: Open source universal authorization

Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and...

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

dhs amanda conley 3x2

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

A vast network of identity avatars. [identity management]

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

a hooded figure targets a coding vulnerability

How and why threat actors target Microsoft Active Directory

New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.

Impersonation / disguise / fraud / false identity / identity theft

Mitek launches MiVIP platform to fight identity theft

The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.

Matias Woloski, co-founder and CTO, Auth0

Auth0’s Matias Woloski on prioritizing the developer experience

The Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more.

access control / authentication / privileges / security / key

Cloud-native TACACS+ access solution launched by Portnox

New product aims to make network authentication, authorization, and accounting technology more attractive to mid-sized companies.

binary cyberattack cybersecurity hacked protected

How to mitigate Active Directory attacks that use the KrbRelayUp toolset

Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.

access management / access control / user connections / identities

Web3 and IAM: Marching toward disruption

While the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM.

Load More
You Might Also Like