Machine identities lack essential security controls, pose major threat

Siloed approaches to securing human and machine identities are driving identity-based attacks across enterprises and their ecosystems, according to CyberArk. The CyberArk 2024 Identity Security Threat Landscape Report was conducted across private and p… Continue reading Machine identities lack essential security controls, pose major threat

Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft has launched its new Purview Audit Search Graph API in public preview for commercial customers. This new API allows IT administrators to programmatically search and retrieve audit logs, improving how organizations track and secure their data usage. Microsoft Purview Audit is a feature that lets IT administrators monitor and track data usage and access…

The post Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Microsoft has launched its new Purview Audit Search Graph API in public preview for commercial customers. This new API allows IT administrators to programmatically search and retrieve audit logs, improving how organizations track and secure their data usage. Microsoft Purview Audit is a feature that lets IT administrators monitor and track data usage and access…

The post Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring appeared first on Petri IT Knowledgebase.

Continue reading Microsoft Purview Launches Audit Search Graph API for Seamless Data Monitoring

Who owns customer identity?

When I’m talking with prospective clients, I like to ask: which department owns customer identity? Everyone immediately looks towards a different team. While every team touches customer identity at some point, the teams that own it differ from organiza… Continue reading Who owns customer identity?

Strategies for secure identity management in hybrid environments

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. She emphasizes balancing and adopting comprehensive security controls, including cloud… Continue reading Strategies for secure identity management in hybrid environments

How can the energy sector bolster its resilience to ransomware attacks?

Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this industry have grown significantly in recent years, as geopolitical tensions hav… Continue reading How can the energy sector bolster its resilience to ransomware attacks?

How much does cloud-based identity expand your attack surface?

We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael Jordan once said, “Get the fundamentals down, and the level of everything you … Continue reading How much does cloud-based identity expand your attack surface?

8 cybersecurity predictions shaping the future of cyber defense

Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI). Two-thirds of global 100 organizations are expected to ex… Continue reading 8 cybersecurity predictions shaping the future of cyber defense

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The US National Institute of Standards and Technology’s framework defines federal policy, but it can be used by private enterprises, too. Here’s what you need to know. Continue reading NIST Cybersecurity Framework: A Cheat Sheet for Professionals

How organizations can navigate identity security risks in 2024

Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and operational efficiency. In this Help Net Security interview, Deepak Taneja, CEO of Zi… Continue reading How organizations can navigate identity security risks in 2024