Passwords, passkeys and familiarity bias

As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity. Most of us could be forgiven for not realizing passwordless authentication […]

The post Passwords, passkeys and familiarity bias appeared first on Security Intelligence.

Continue reading Passwords, passkeys and familiarity bias

Obtaining security clearance: Hurdles and requirements

As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense. Obtaining that clearance, however, is far from simple. […]

The post Obtaining security clearance: Hurdles and requirements appeared first on Security Intelligence.

Continue reading Obtaining security clearance: Hurdles and requirements

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

Identity Security Firm Silverfort Lands $116 Million Investment

Israeli late-stage startup Silverfort raises a whopping $116 million in new financing to scale its ambitions in the identity security space.
The post Identity Security Firm Silverfort Lands $116 Million Investment appeared first on SecurityWeek.
Continue reading Identity Security Firm Silverfort Lands $116 Million Investment

Oleria Secures $33M Investment to Grow ID Authentication Business

Seattle identity and authentication startup Oleria has attracted renewed interest from venture capital investors.
The post Oleria Secures $33M Investment to Grow ID Authentication Business appeared first on SecurityWeek.
Continue reading Oleria Secures $33M Investment to Grow ID Authentication Business

Delinea Acquires Authomize to Tackle Identity-Based Threats

Delinea acquires Israeli startup Authomize to add identity threat detection and response (IDTR) technologies to its product portfolio.
The post Delinea Acquires Authomize to Tackle Identity-Based Threats appeared first on SecurityWeek.
Continue reading Delinea Acquires Authomize to Tackle Identity-Based Threats