newsAmazon debuts biometric security device, updates Detective and GuardDutyAmazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities.By Jon Gold29 Nov 20233 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management feature The alarming rise of quishing is a red flag for CISOsBy Matthew Tyson21 Nov 20238 minsPhishingIdentity and Access ManagementSecurity Practicesopinion The SSO tax is killing trust in the security industryBy Joe Sullivan and Atul Tulshiibagwale21 Nov 202310 minsAuthenticationSingle Sign-onIdentity and Access Management featureAs perimeter defenses fall, the identify-first approach steps into the breachBy Mary K. Pratt 14 Nov 20239 minsCSO and CISOZero TrustIdentity and Access Management featureKeep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda Rosencrance 08 Nov 20238 minsCSO and CISOCloud SecurityData and Information Security newsFacebook tops security ratings among social networksBy Jon Gold 07 Nov 20233 minsInternet SecurityIdentity and Access ManagementPrivacy newsFrontegg releases new identity, user management solution for SaaS productsBy Michael Hill 07 Nov 20234 minsAuthenticationAccess ControlIdentity Management Solutions newsTeleport’s new offering to help reduce attack response timesBy Shweta Sharma 26 Oct 20233 minsIdentity and Access Management newsOkta support system breach highlights need for strong MFA policiesBy Lucian Constantin 23 Oct 20234 minsMulti-factor AuthenticationData BreachIdentity and Access Management ArticlesnewsInactive accounts pose significant account takeover security risksInactive accounts that haven’t been accessed for extended periods are more likely to be compromised due to password reuse and lack of multifactor authentication.By Michael Hill 25 May 2023 4 minsPasswordsAuthenticationIdentity and Access ManagementfeatureEmbracing zero-trust: a look at the NSA's recommended IAM best practices for administratorsThe US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.By Chris Hughes 26 Apr 2023 8 minsZero TrustGovernmentData and Information SecuritynewsXage's new IAM offering provides multilayer authentication for ICS/OTThe multilayer IAM maps services from a user’s multiple identity and active directory providers onto different network layers of ICS/OT systems.By Shweta Sharma 20 Apr 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access ManagementnewsDaon's TrustX to offer SaaS-based, no-code identity journeysTrustX’s AI/ML-powered platform builds, authenticates, and manages identity journeys through no-code, drag-and-drop orchestration.By Shweta Sharma 18 Apr 2023 3 minsIdentity and Access ManagementNo Code and Low CodeSecurity Softwarefeature19 startups to check out at RSA Conference 2023Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.By Michael Nadeau 18 Apr 2023 8 minsAuthenticationRSA ConferenceDevSecOpsnewsInside-Out Defense launches privilege access abuse detection, remediation platformSaaS platform complements other identity and access management, privilege access management, and custom identity solutions as cybercriminals prioritize stolen access credentials.By Michael Hill 12 Apr 2023 3 minsAccess ControlIdentity and Access ManagementnewsDeveloped countries lag emerging markets in cybersecurity readinessOrganizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report. By Apurva Venkat 21 Mar 2023 4 minsData and Information SecurityEndpoint ProtectionIdentity and Access ManagementnewsForgeRock, Secret Double Octopus offer passwordless authentication for enterprisesForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure. By Shweta Sharma 20 Mar 2023 3 minsPasswordsIdentity and Access ManagementnewsBeyond Identity launches Zero Trust Authentication to align verification with zero-trust principlesZero Trust Authentication is designed to negate the shortcomings of traditional authentication methods with features including passwordless capability and phishing resistance.By Michael Hill 15 Mar 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access Managementhow-toDefending against attacks on Azure AD: Goodbye firewall, hello identity protectionGone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks. By Susan Bradley 15 Feb 2023 7 minsMicrosoft AzureCloud SecurityIdentity and Access ManagementfeatureTop 7 CIAM toolsCustomer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.By Ericka Chickowski 28 Nov 2022 11 minsIdentity and Access ManagementnewsAlmost half of customers have left a vendor due to poor digital trust: ReportNew research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.By Charlotte Trueman 18 Nov 2022 4 minsEmail SecurityData and Information SecurityIdentity and Access Management Show more Show less View all Resources whitepaper Magic Quadrant for Distributed File Systems and Object Storage This Gartner Magic Quadrant research assesses the vision and execution of vendors in this market, and Dell Technologies, for the 7th consecutively year is ranked as a leader in the Magic Quadrant. The post Magic Quadrant for Distributed File Systems and Object Storage appeared first on Whitepaper Repository. By Dell Technologies and Intel(R) 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel(R) 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development whitepaper Optimizing the PC Lifecycle: Dell PC as a Service By Dell Technologies 13 May 2022ComputersEmployee ExperienceIT Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Top cybersecurity product news of the week By CSO staff 30 Nov 202317 mins Generative AIGenerative AIMachine Learning feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless 30 Nov 20238 mins Security Operations CenterData and Information SecuritySecurity Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement By Lucian Constantin 30 Nov 20238 mins Multi-factor AuthenticationSingle Sign-onRemote Access Security podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO