2024 roundup: Top data breach stories and industry trends

With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over. […]

The post 2024 roundup: Top data breach stories and industry trends appeared first on Security Intelligence.

Continue reading 2024 roundup: Top data breach stories and industry trends

Another category? Why we need ITDR

Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in […]

The post Another category? Why we need ITDR appeared first on Security Intelligence.

Continue reading Another category? Why we need ITDR

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

Zero Trust Data Security: It’s Time To Make the Shift

How do you secure something that no longer exists? With the rapid expansion of hybrid-remote work, IoT, APIs and applications, any notion of a network perimeter has effectively been eliminated. Plus, any risk inherent to your tech stack components becomes your risk whether you like it or not.  Organizations of all sizes are increasingly vulnerable […]

The post Zero Trust Data Security: It’s Time To Make the Shift appeared first on Security Intelligence.

Continue reading Zero Trust Data Security: It’s Time To Make the Shift

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on […]

The post Why Your Success Depends on Your IAM Capability appeared first on Security Intelligence.

Continue reading Why Your Success Depends on Your IAM Capability

Securing Cloud Technology in a Growing Threat Landscape

Cloud technologies are becoming more and more popular. Many companies shifted their workloads and their IT infrastructures into the cloud. The advantages are clear: more flexibility and scalability, less admin overhead and often cost savings. But with those advantages also come many risks. Recent studies have shown several threats cloud technologies face. As data transfers […]

The post Securing Cloud Technology in a Growing Threat Landscape appeared first on Security Intelligence.

Continue reading Securing Cloud Technology in a Growing Threat Landscape

How to Create Identity and Access Governance In and Across Clouds

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]

The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.

Continue reading How to Create Identity and Access Governance In and Across Clouds