Identity Management Solutions

Identity Management Solutions | News, how-tos, features, reviews, and videos

Hands type on a laptop keyboard.
cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

A vast network of identity avatars. [identity management]

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

a hooded figure targets a coding vulnerability

How and why threat actors target Microsoft Active Directory

New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.

binary cyberattack cybersecurity hacked protected

How to mitigate Active Directory attacks that use the KrbRelayUp toolset

Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Patching the latest Active Directory vulnerabilities is not enough

Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities.

Thoma Bravo's $6.9B SailPoint deal brings IAM to security portfolio

SailPoint's IAM (identity access management) capabilities fill a gap in private equity firm Thoma Bravo's cybersecurity portfolio.

network security / secure connections / integrated system of locks

Attivo Networks expands Active Directory protection

Domain Controller solution guards against bad behavior from unmanaged devices.

access control / authentication / privileges / security / key

Active Directory security updates: What you need to know

These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

Identity access management  >  abstract network connections and circuits reflected in eye

One Identity acquires OneLogin in bid to offer consolidated IAM suite

In a move to offer its customers a consolidated suite of security applications, One Identity has acquired OneLogin, an IAM (identity and access management) provider, adding to its own set of PAM (privileged access management, IGA...

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

One lock in a series is unlocked / weakness / vulnerability

6 vulnerabilities Microsoft hasn't patched (or can't)

Your IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

How to review password quality in Active Directory

Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.

Windows security and protection [Windows logo/locks]

How to check for Active Directory Certificate Services misconfigurations

Recently discovered Microsoft Windows AD CS configuration errors could give attackers account and domain control. Here's how to audit AD CS for vulnerable configurations.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM is a set of processes, policies, and tools for controlling user access to critical information within an organization.

infographic of cloudscape reflect to modern multicloud technology picture id1262031859 2

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Load More
You Might Also Like