The role of self-sovereign identity in enterprises

As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, traditional identity systems used by enterprises often expose sensitive informat… Continue reading The role of self-sovereign identity in enterprises

Exclusive: Kevin Mandia joins SpecterOps as chair of the board

The Mandiant founder and Google Cloud adviser tells CyberScoop that he sees a lot of similarities between SpecterOps and the early days of his cybersecurity powerhouse company.

The post Exclusive: Kevin Mandia joins SpecterOps as chair of the board appeared first on CyberScoop.

Continue reading Exclusive: Kevin Mandia joins SpecterOps as chair of the board

Reducing credential complexity with identity federation

In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on organizational security and user experience. He explains how this approach streamlines credential management and enhances… Continue reading Reducing credential complexity with identity federation

3 tips for securing IoT devices in a connected world

IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected devices are now a fixture in the modern workplace. They also, however, present a … Continue reading 3 tips for securing IoT devices in a connected world

Active Directory compromise: Cybersecurity agencies provde guidance

Active Directory (AD), Microsoft’s on-premises directory service for Windows domain networks, is so widely used for enterprise identity and access management that compromising it has become almost a standard step in cyber intrusions. “Activ… Continue reading Active Directory compromise: Cybersecurity agencies provde guidance

Risk related to non-human identities: Believe the hype, reject the FUD

The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and API keys – has recently skyrocketed. A steady stream of NHI-related brea… Continue reading Risk related to non-human identities: Believe the hype, reject the FUD

Machine identities lack essential security controls, pose major threat

Siloed approaches to securing human and machine identities are driving identity-based attacks across enterprises and their ecosystems, according to CyberArk. The CyberArk 2024 Identity Security Threat Landscape Report was conducted across private and p… Continue reading Machine identities lack essential security controls, pose major threat

Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft has launched its new Purview Audit Search Graph API in public preview for commercial customers. This new API allows IT administrators to programmatically search and retrieve audit logs, improving how organizations track and secure their data usage. Microsoft Purview Audit is a feature that lets IT administrators monitor and track data usage and access…

The post Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft has launched its new Purview Audit Search Graph API in public preview for commercial customers. This new API allows IT administrators to programmatically search and retrieve audit logs, improving how organizations track and secure their data usage. Microsoft Purview Audit is a feature that lets IT administrators monitor and track data usage and access…

The post Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring