EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Continue reading EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Thoma Bravo Merges ForgeRock with Ping Identity

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.
The post Thoma Bravo Merges ForgeRock with Ping Identity appeared first on SecurityWeek.
Continue reading Thoma Bravo Merges ForgeRock with Ping Identity

Cerby Raises $17 Million for Access Management Platform for Nonstandard Applications

Cerby has raised $17 million in Series A funding for its access management platform for applications not supported by identity providers.
The post Cerby Raises $17 Million for Access Management Platform for Nonstandard Applications appeared first on Se… Continue reading Cerby Raises $17 Million for Access Management Platform for Nonstandard Applications

PingIdentity launches decentralized identity management

With PingOne Neo, PingIdentity aims to accelerate “speed to trust”, supercharge identity management and put control of a user’s identity in the user’s pocket.
The post PingIdentity launches decentralized identity management appeared first on TechRepubl… Continue reading PingIdentity launches decentralized identity management

Cyber Insights 2023 | Zero Trust and Identity and Access Management

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and everything, everywhere and anytime.

The post Cyber Insights 2023 | Zero Trust and Identity and Access Management appeared first on SecurityWeek.

Continue reading Cyber Insights 2023 | Zero Trust and Identity and Access Management

New research identifies poor IAM policies as the greatest cloud vulnerability

Palo Alto Networks threat intelligence unit finds identity and access management policy flaws remain a principal cause of cloud security vulnerabilities.

The post New research identifies poor IAM policies as the greatest cloud vulnerability appeared first on CyberScoop.

Continue reading New research identifies poor IAM policies as the greatest cloud vulnerability