News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

The Threatpost team breaks down the top privacy-related data incidents of the week – including data leaks from HCL and a golfing app – and highlights some surprisingly good privacy news. Continue reading News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

Goodbye Passwords: Hello Identity Management

As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack. Continue reading Goodbye Passwords: Hello Identity Management

Tips for Choosing the Best IAM Solution

Information is power, so only the right people must have access to it. Identity and access management (IAM) is one of the key tools you can use for ensuring corporate cybersecurity. There are many security providers on the market, but how do you know … Continue reading Tips for Choosing the Best IAM Solution

Scytale grabs $5M Series A for application-to-application identity management

Scytale, a startup that wants to bring identity and access management to application-to-application activities, announced a $5 million Series A round today. The round was led by Bessemer Venture Partners, a return investor which led the company’s previous $3 million round in 2018. Bain Capital Ventures, TechOperators and Work-Bench are also participating in this round. […] Continue reading Scytale grabs $5M Series A for application-to-application identity management

The Role of Privileged Access Management in Addressing Cybersecurity Challenges

Organizations spend over $100 billion globally on cybersecurity. In spite of that level of investment in cybersecurity and the attention paid to network security and data protection, major data breaches are still relatively common—and increasing…. Continue reading The Role of Privileged Access Management in Addressing Cybersecurity Challenges

Has Technology Improved or Destroyed Business Security?

Technology has tremendously affected how businesses operate. There is no denying the fact that these modern advancements provide substantial benefits that enabled even the smallest enterprises to compete on a global scale. However, as businesses are be… Continue reading Has Technology Improved or Destroyed Business Security?

Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

I was honored to have Wendy Nather, head of advisory CISOs for Duo Security–now part of Cisco, join me as my guest for this episode of the Inner Circle podcast. Wendy is one of the most respected voices in cybersecurity today–which also exp… Continue reading Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

Why Identity Security Matters

Many executives and business owners haven’t really spent much time thinking about identity security within their organizations. It makes sense because they have so many other, more pressing matters to think about, like growing their business. But… Continue reading Why Identity Security Matters

The Art of Digital Identity

Identity and access management (IAM) is a discipline within cybersecurity that seeks to ensure that only the right people can access the appropriate data and resources, at the right times and for the right reasons. The ultimate goal for hackers is to … Continue reading The Art of Digital Identity

Old password habits die hard … if they ever die at all

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to do so poorly. And that, in turn, leads to password reset request… Continue reading Old password habits die hard … if they ever die at all