newsAmazon debuts biometric security device, updates Detective and GuardDutyAmazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities.By Jon GoldNov 29, 20233 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management feature The alarming rise of quishing is a red flag for CISOsBy Matthew TysonNov 21, 20238 minsPhishingIdentity and Access ManagementSecurity Practicesopinion The SSO tax is killing trust in the security industryBy Joe Sullivan and Atul TulshiibagwaleNov 21, 202310 minsAuthenticationSingle Sign-onIdentity and Access Management featureAs perimeter defenses fall, the identify-first approach steps into the breachBy Mary K. Pratt Nov 14, 20239 minsCSO and CISOZero TrustIdentity and Access Management featureKeep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda Rosencrance Nov 08, 20238 minsCSO and CISOCloud SecurityData and Information Security newsFacebook tops security ratings among social networksBy Jon Gold Nov 07, 20233 minsInternet SecurityIdentity and Access ManagementPrivacy newsFrontegg releases new identity, user management solution for SaaS productsBy Michael Hill Nov 07, 20234 minsAuthenticationAccess ControlIdentity Management Solutions newsTeleport’s new offering to help reduce attack response timesBy Shweta Sharma Oct 26, 20233 minsIdentity and Access Management newsOkta support system breach highlights need for strong MFA policiesBy Lucian Constantin Oct 23, 20234 minsMulti-factor AuthenticationData BreachIdentity and Access Management ArticlesnewsInactive accounts pose significant account takeover security risksInactive accounts that haven’t been accessed for extended periods are more likely to be compromised due to password reuse and lack of multifactor authentication.By Michael Hill May 25, 2023 4 minsPasswordsAuthenticationIdentity and Access ManagementfeatureEmbracing zero-trust: a look at the NSA's recommended IAM best practices for administratorsThe US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.By Chris Hughes Apr 26, 2023 8 minsZero TrustGovernmentData and Information SecuritynewsXage's new IAM offering provides multilayer authentication for ICS/OTThe multilayer IAM maps services from a user’s multiple identity and active directory providers onto different network layers of ICS/OT systems.By Shweta Sharma Apr 20, 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access ManagementnewsDaon's TrustX to offer SaaS-based, no-code identity journeysTrustX’s AI/ML-powered platform builds, authenticates, and manages identity journeys through no-code, drag-and-drop orchestration.By Shweta Sharma Apr 18, 2023 3 minsIdentity and Access ManagementNo Code and Low CodeSecurity Softwarefeature19 startups to check out at RSA Conference 2023Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.By Michael Nadeau Apr 18, 2023 8 minsAuthenticationRSA ConferenceDevSecOpsnewsInside-Out Defense launches privilege access abuse detection, remediation platformSaaS platform complements other identity and access management, privilege access management, and custom identity solutions as cybercriminals prioritize stolen access credentials.By Michael Hill Apr 12, 2023 3 minsAccess ControlIdentity and Access ManagementnewsDeveloped countries lag emerging markets in cybersecurity readinessOrganizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report. By Apurva Venkat Mar 21, 2023 4 minsData and Information SecurityEndpoint ProtectionIdentity and Access ManagementnewsForgeRock, Secret Double Octopus offer passwordless authentication for enterprisesForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure. By Shweta Sharma Mar 20, 2023 3 minsPasswordsIdentity and Access ManagementnewsBeyond Identity launches Zero Trust Authentication to align verification with zero-trust principlesZero Trust Authentication is designed to negate the shortcomings of traditional authentication methods with features including passwordless capability and phishing resistance.By Michael Hill Mar 15, 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access Managementhow-toDefending against attacks on Azure AD: Goodbye firewall, hello identity protectionGone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks. By Susan Bradley Feb 15, 2023 7 minsMicrosoft AzureCloud SecurityIdentity and Access ManagementfeatureTop 7 CIAM toolsCustomer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.By Ericka Chickowski Nov 28, 2022 11 minsIdentity and Access ManagementnewsAlmost half of customers have left a vendor due to poor digital trust: ReportNew research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.By Charlotte Trueman Nov 18, 2022 4 minsEmail SecurityData and Information SecurityIdentity and Access Management Show more Show less View all Resources whitepaper Privileged Access Management Maturity in the Cloud Whether you need to understand current risks or enhance cloud adoption, discover the difference of Saviynt's cloud-powered PAM solution. The post Privileged Access Management Maturity in the Cloud appeared first on Whitepaper Repository. By Saviynt 24 Jan 2023Business OperationsCyberattacksIdentity and Access Management whitepaper Identity Governance & Administration Solution Buyer's Guide By Saviynt 24 Jan 2023Business OperationsCloud StorageIdentity and Access Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur Dec 06, 20234 mins IT JobsSecurity Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities By Susan Bradley Dec 06, 20236 mins Patch Management SoftwareThreat and Vulnerability ManagementWindows Security feature What should be in a company-wide policy on low-code/no-code development By Ericka Chickowski Dec 06, 202315 mins Application SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO