featureThe alarming rise of quishing is a red flag for CISOsMultiple reports show a dramatic rise in phishing scams employing QR codes. Now is the time for security leaders to take proactive steps.By Matthew TysonNov 21, 20238 minsPhishingIdentity and Access ManagementSecurity Practices opinion The SSO tax is killing trust in the security industryBy Joe Sullivan and Atul TulshiibagwaleNov 21, 202310 minsAuthenticationSingle Sign-onIdentity and Access Managementfeature As perimeter defenses fall, the identify-first approach steps into the breachBy Mary K. PrattNov 14, 20239 minsCSO and CISOZero TrustIdentity and Access Management featureKeep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda Rosencrance Nov 08, 20238 minsCSO and CISOCloud SecurityData and Information Security newsFacebook tops security ratings among social networksBy Jon Gold Nov 07, 20233 minsInternet SecurityIdentity and Access ManagementPrivacy newsFrontegg releases new identity, user management solution for SaaS productsBy Michael Hill Nov 07, 20234 minsAuthenticationAccess ControlIdentity Management Solutions newsTeleport’s new offering to help reduce attack response timesBy Shweta Sharma Oct 26, 20233 minsIdentity and Access Management newsOkta support system breach highlights need for strong MFA policiesBy Lucian Constantin Oct 23, 20234 minsMulti-factor AuthenticationData BreachIdentity and Access Management newsMost organizations globally have implemented zero trustBy Samira Sarraf Oct 18, 20234 minsAuthenticationZero TrustIdentity and Access Management ArticlesfeatureEmbracing zero-trust: a look at the NSA's recommended IAM best practices for administratorsThe US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.By Chris Hughes Apr 26, 2023 8 minsZero TrustGovernmentData and Information SecuritynewsXage's new IAM offering provides multilayer authentication for ICS/OTThe multilayer IAM maps services from a user’s multiple identity and active directory providers onto different network layers of ICS/OT systems.By Shweta Sharma Apr 20, 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access ManagementnewsDaon's TrustX to offer SaaS-based, no-code identity journeysTrustX’s AI/ML-powered platform builds, authenticates, and manages identity journeys through no-code, drag-and-drop orchestration.By Shweta Sharma Apr 18, 2023 3 minsIdentity and Access ManagementNo Code and Low CodeSecurity Softwarefeature19 startups to check out at RSA Conference 2023Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.By Michael Nadeau Apr 18, 2023 8 minsAuthenticationRSA ConferenceDevSecOpsnewsInside-Out Defense launches privilege access abuse detection, remediation platformSaaS platform complements other identity and access management, privilege access management, and custom identity solutions as cybercriminals prioritize stolen access credentials.By Michael Hill Apr 12, 2023 3 minsAccess ControlIdentity and Access ManagementnewsDeveloped countries lag emerging markets in cybersecurity readinessOrganizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report. By Apurva Venkat Mar 21, 2023 4 minsData and Information SecurityEndpoint ProtectionIdentity and Access ManagementnewsForgeRock, Secret Double Octopus offer passwordless authentication for enterprisesForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure. By Shweta Sharma Mar 20, 2023 3 minsPasswordsIdentity and Access ManagementnewsBeyond Identity launches Zero Trust Authentication to align verification with zero-trust principlesZero Trust Authentication is designed to negate the shortcomings of traditional authentication methods with features including passwordless capability and phishing resistance.By Michael Hill Mar 15, 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access Managementhow-toDefending against attacks on Azure AD: Goodbye firewall, hello identity protectionGone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks. By Susan Bradley Feb 15, 2023 7 minsMicrosoft AzureCloud SecurityIdentity and Access ManagementfeatureTop 7 CIAM toolsCustomer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.By Ericka Chickowski Nov 28, 2022 11 minsIdentity and Access ManagementnewsAlmost half of customers have left a vendor due to poor digital trust: ReportNew research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.By Charlotte Trueman Nov 18, 2022 4 minsEmail SecurityData and Information SecurityIdentity and Access ManagementnewsForgeRock set to roll out new IAM capabilities designed for the cloudAutomation and AI are the headliners for ForgeRock’s new IAM platform, which aims to simplify an increasingly complex identity and security landscape.By Jon Gold Nov 15, 2022 2 minsCloud SecurityIdentity and Access Management Show more Show less View all Resources whitepaper Privileged Access Management Maturity in the Cloud Whether you need to understand current risks or enhance cloud adoption, discover the difference of Saviynt's cloud-powered PAM solution. The post Privileged Access Management Maturity in the Cloud appeared first on Whitepaper Repository. By Saviynt 24 Jan 2023Business OperationsCyberattacksIdentity and Access Management whitepaper Identity Governance & Administration Solution Buyer's Guide By Saviynt 24 Jan 2023Business OperationsCloud StorageIdentity and Access Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs By Maria Korolov Nov 29, 20239 mins Security PracticesVulnerabilitiesSecurity news Amazon’s AWS Control Tower aims to help secure your data’s borders By Jon Gold Nov 28, 20233 mins RegulationCloud Security news North Korean hackers mix code from proven malware campaigns to avoid detection By Shweta Sharma Nov 28, 20233 mins Malware podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO