featureHybrid Microsoft network/cloud legacy settings may impact your future security postureSwitching from legacy Active Directory systems to the cloud can improve versatility but hybrid systems need special attention to ensure they’re still secure.By Susan Bradley22 Jun 20237 minsActive DirectoryWindows SecurityCloud Security news Okta aims to unify IAM for Windows, macOS devices in hybrid work environmentsBy Shweta Sharma13 Jun 20233 minsMulti-factor AuthenticationIdentity and Access Managementnews AI and tech innovation, economic pressures increase identity attack surfaceBy Michael Hill13 Jun 20233 minsAuthenticationGenerative AIIdentity and Access Management newsBastionZero releases SplitCert for password-free authentication and accessBy Michael Hill 08 Jun 20232 minsPasswordsAuthentication newsLacework's new CIEM uses ML to fish out high-risk identitiesBy Shweta Sharma 06 Jun 20233 minsIdentity Management SolutionsCloud Security featureWhat is federated Identity? How it works and its importance to enterprise securityBy Matthew Tyson 31 May 20237 minsSingle Sign-onFederated IdentityIdentity Management Solutions newsInactive accounts pose significant account takeover security risksBy Michael Hill 25 May 20234 minsPasswordsAuthenticationIdentity and Access Management newsCyberArk's enterprise browser promises zero-trust support, policy managementBy Samira Sarraf 24 May 20233 minsZero TrustInternet Security newsTeleport releases Teleport 13 with automatic vulnerability patching, enhanced DevOps securityBy Michael Hill 23 May 20234 minsAccess ControlPatch Management Software Articlesfeature19 startups to check out at RSA Conference 2023Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.By Michael Nadeau 18 Apr 2023 8 minsAuthenticationRSA ConferenceDevSecOpsnewsInside-Out Defense launches privilege access abuse detection, remediation platformSaaS platform complements other identity and access management, privilege access management, and custom identity solutions as cybercriminals prioritize stolen access credentials.By Michael Hill 12 Apr 2023 3 minsAccess ControlIdentity and Access ManagementnewsDeveloped countries lag emerging markets in cybersecurity readinessOrganizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report. By Apurva Venkat 21 Mar 2023 4 minsData and Information SecurityEndpoint ProtectionIdentity and Access ManagementnewsForgeRock, Secret Double Octopus offer passwordless authentication for enterprisesForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure. By Shweta Sharma 20 Mar 2023 3 minsPasswordsIdentity and Access ManagementnewsBeyond Identity launches Zero Trust Authentication to align verification with zero-trust principlesZero Trust Authentication is designed to negate the shortcomings of traditional authentication methods with features including passwordless capability and phishing resistance.By Michael Hill 15 Mar 2023 4 minsMulti-factor AuthenticationZero TrustIdentity and Access Managementhow-toDefending against attacks on Azure AD: Goodbye firewall, hello identity protectionGone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks. By Susan Bradley 15 Feb 2023 7 minsMicrosoft AzureCloud SecurityIdentity and Access ManagementfeatureTop 7 CIAM toolsCustomer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.By Ericka Chickowski 28 Nov 2022 11 minsIdentity and Access ManagementnewsAlmost half of customers have left a vendor due to poor digital trust: ReportNew research from DigiCert has found that digital trust is a key driver of customer loyalty, with 84% of customers saying they would consider leaving a vendor that did not manage digital trust.By Charlotte Trueman 18 Nov 2022 4 minsEmail SecurityData and Information SecurityIdentity and Access ManagementnewsForgeRock set to roll out new IAM capabilities designed for the cloudAutomation and AI are the headliners for ForgeRock’s new IAM platform, which aims to simplify an increasingly complex identity and security landscape.By Jon Gold 15 Nov 2022 2 minsCloud SecurityIdentity and Access Managementfeature8 top multi-factor authentication products and how to choose an MFA solutionLearn the key considerations when choosing an MFA solution and why these top picks are worth a look.By Tim Ferrill 19 Oct 2022 10 minsMulti-factor AuthenticationAuthenticationIdentity and Access ManagementnewsReport: The state of secure identity 2022New research from Okta’s Auth0 access management platform found that credential stuffing and fraudulent registration attacks are on the rise.By Charlotte Trueman 21 Sep 2022 4 minsIdentity and Access ManagementfeatureHow Azure Active Directory opens new authentication risksHybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.By Lucian Constantin 05 Sep 2022 7 minsAuthenticationMicrosoft AzureIdentity and Access Management Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime