Identity Management Solutions

Identity Management Solutions | News, how-tos, features, reviews, and videos

Palo Alto Networks
Conceptual image of a network labeled 'Zero Trust.'

Microsoft Windows 7 security patches/updates

Why you might not be done with your January Microsoft security patches

Microsoft released a flurry of security patches and updates in January, so it would be easy to overlook these two.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Trulioo launches end-to-end identity platform

The new Trulioo platform will combine all existing Trulioo products into a single platform, allowing the ID verification firm to target global enterprise customers.

cloud security

Okta streamlines IAM portfolio with consumer identity management cloud

Incorporation of Auth0 features and more closely integrated management highlights new cloud-based IAM (identity and access management) system.

Hands type on a laptop keyboard.

Recommended security resources for Microsoft Active Directory

These resources will keep you up to date on how to best protect your Active Directory domains.

cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Teleport features passwordless access with new access plane update

With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware.

A vast network of identity avatars. [identity management]

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...

a hooded figure targets a coding vulnerability

How and why threat actors target Microsoft Active Directory

New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.

binary cyberattack cybersecurity hacked protected

How to mitigate Active Directory attacks that use the KrbRelayUp toolset

Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Patching the latest Active Directory vulnerabilities is not enough

Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities.

Thoma Bravo's $6.9B SailPoint deal brings IAM to security portfolio

SailPoint's IAM (identity access management) capabilities fill a gap in private equity firm Thoma Bravo's cybersecurity portfolio.

network security / secure connections / integrated system of locks

Attivo Networks expands Active Directory protection

Domain Controller solution guards against bad behavior from unmanaged devices.

access control / authentication / privileges / security / key

Active Directory security updates: What you need to know

These Active Directory updates address critical privilege bypass and elevation vulnerabilities. Implement them now if you can.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

Identity access management  >  abstract network connections and circuits reflected in eye

One Identity acquires OneLogin in bid to offer consolidated IAM suite

In a move to offer its customers a consolidated suite of security applications, One Identity has acquired OneLogin, an IAM (identity and access management) provider, adding to its own set of PAM (privileged access management, IGA...

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

One lock in a series is unlocked / weakness / vulnerability

6 vulnerabilities Microsoft hasn't patched (or can't)

Your IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

How to review password quality in Active Directory

Regular reviews of the effectiveness of user, admin, and service passwords stored in Active Directory is a good idea. Here's how one password review tool works.

Load More
You Might Also Like