newsIAM, cloud security to drive new cybersecurity spendingCISOs also say they want better third-party risk management, AI security, and human error/insider risk reduction solutions.By Michael HillSep 07, 20234 minsCSO and CISOGenerative AICloud Security feature Why Instagram Threads is a hotbed of risks for businessesBy Michael HillSep 04, 20238 minsPhishingHackingSocial Engineeringnews Identity-based security threats are growing rapidly: reportBy Jon GoldAug 08, 20233 minsEndpoint ProtectionIdentity and Access Management newsNew access management tool to focus on the least privileges By Shweta Sharma Jul 28, 20233 minsCloud SecurityIdentity and Access Management newsOkta aims to unify IAM for Windows, macOS devices in hybrid work environmentsBy Shweta Sharma Jun 13, 20233 minsMulti-factor AuthenticationIdentity and Access Management newsAI and tech innovation, economic pressures increase identity attack surfaceBy Michael Hill Jun 13, 20233 minsAuthenticationGenerative AIIdentity and Access Management featureWhat is federated Identity? How it works and its importance to enterprise securityBy Matthew Tyson May 31, 20237 minsSingle Sign-onFederated IdentityIdentity Management Solutions newsInactive accounts pose significant account takeover security risksBy Michael Hill May 25, 20234 minsPasswordsAuthenticationIdentity and Access Management featureEmbracing zero-trust: a look at the NSA's recommended IAM best practices for administratorsBy Chris Hughes Apr 26, 20238 minsZero TrustZero TrustZero Trust Articlesfeature8 top multi-factor authentication products and how to choose an MFA solutionLearn the key considerations when choosing an MFA solution and why these top picks are worth a look.By Tim Ferrill Oct 19, 2022 10 minsMulti-factor AuthenticationAuthenticationIdentity and Access ManagementnewsReport: The state of secure identity 2022New research from Okta’s Auth0 access management platform found that credential stuffing and fraudulent registration attacks are on the rise.By Charlotte Trueman Sep 21, 2022 4 minsIdentity and Access ManagementfeatureHow Azure Active Directory opens new authentication risksHybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.By Lucian Constantin Sep 05, 2022 7 minsAuthenticationMicrosoft AzureIdentity and Access ManagementnewsRemediant wants to move beyond PAM to secure enterprise networksRemediant created its new PAM+ strategy to help negate credential-based compromises, protect access and accelerate Zero Trust initiatives.By Apurva Venkat Sep 01, 2022 3 minsIdentity and Access ManagementnewsIdentity management difficulties continue to plague IT departmentsCentralizing and managing identity data remains a low priority for many IT decision-makers, according to a new study.By Jon Gold Aug 22, 2022 3 minsIdentity and Access ManagementnewsThoma Bravo snares Ping Identity in $2.8 billion go-private dealPrivate equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.By Jon Gold Aug 03, 2022 3 minsIdentity and Access ManagementMergers and AcquisitionsanalysisWhat is decentralized identity?Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity going forward.By Matthew Tyson Jul 06, 2022 8 minsIdentity Management SolutionsBlockchainIdentity and Access Managementfeature6 signs your IAM strategy is failing, and how to fix itMistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.By Maria Korolov Jul 05, 2022 7 minsAuthenticationIdentity and Access ManagementnewsMitek launches MiVIP platform to fight identity theftThe Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.By John Mello Jr. Jun 24, 2022 3 minsAuthenticationIdentity and Access ManagementinterviewAuth0's Matias Woloski on prioritizing the developer experienceThe Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more.By Matthew Tyson Jun 21, 2022 8 minsIdentity and Access ManagementopinionWeb3 and IAM: Marching toward disruptionWhile the debate about Web3’s long-term relevance rages, the technology itself goes merrily on its way, finding ever more avenues of use. One area that is seeing interesting potential and actual developments is IAM. By Matthew Tyson Jun 13, 2022 6 minsAccess ControlBlockchainIdentity and Access ManagementnewsGitHub open sources Entitlements IAM sytem, built as a Git repositoryThe company behind one of the most important open source projects in the world is providing a new way to use its framework for IAM (identity and access management) this week.By Jon Gold Jun 10, 2022 2 minsIdentity and Access ManagementOpen Source Show more Show less View all Resources whitepaper Privileged Access Management Maturity in the Cloud Whether you need to understand current risks or enhance cloud adoption, discover the difference of Saviynt's cloud-powered PAM solution. The post Privileged Access Management Maturity in the Cloud appeared first on Whitepaper Repository. By Saviynt 24 Jan 2023Business OperationsCyberattacksIdentity and Access Management whitepaper Identity Governance & Administration Solution Buyer's Guide By Saviynt 24 Jan 2023Business OperationsCloud StorageIdentity and Access Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield Sep 25, 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma Sep 25, 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance Sep 25, 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO