4 steps for building an orchestrated authorization policy for zero trust

There is a great deal of emphasis placed on the zero-trust approach with respect to access. Looking beyond authentication (the act of verifying that someone is who they say they are), evaluating authorization is just as important as it determines what … Continue reading 4 steps for building an orchestrated authorization policy for zero trust

Why managing and securing digital identities is a must

In this video for Help Net Security, Julie Smith, Executive Director of the Identity Defined Security Alliance (IDSA), talks about how IDSA and National Cybersecurity Alliance partnered to create Identity Management Day. This first began last year in 2… Continue reading Why managing and securing digital identities is a must

Cloud identity access and management market to reach $13.6 billion by 2026

Amid the COVID-19 crisis, the global market for cloud identity access and management (IAM) estimated at $5.3 billion in the year 2022, is projected to reach a revised size of $13.6 billion by 2026, growing at a CAGR of 26.7% over the analysis period, a… Continue reading Cloud identity access and management market to reach $13.6 billion by 2026

Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and application identities in the form of digital certificates, the backbone of enterpri… Continue reading Lack of CLM maturity is putting organizations at risk

The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study found that the top driver for migrating to the cloud is the need to increase se… Continue reading The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

Cyber company Okta is latest potential victim of Lapsus$ hackers

The financially motivated group of malicious hackers posted screenshots that Okta said could be related to “activity” detected in January.

The post Cyber company Okta is latest potential victim of Lapsus$ hackers appeared first on CyberScoop.

Continue reading Cyber company Okta is latest potential victim of Lapsus$ hackers

SentinelOne to acquire identity security firm Attivo Networks for $616.5M

The acquisition of Attivo Networks “is a natural platform progression” for SentinelOne, said COO Nicholas Warner.

The post SentinelOne to acquire identity security firm Attivo Networks for $616.5M appeared first on CyberScoop.

Continue reading SentinelOne to acquire identity security firm Attivo Networks for $616.5M

What is fueling the adoption of passwordless authentication?

An identity and access management research report from Enterprise Strategy Group (ESG), finds organizations, frustrated with poor user experience and weak security, are moving towards adopting passwordless, continuous authentication. The impact of adop… Continue reading What is fueling the adoption of passwordless authentication?

The importance of balancing security requirements and employee user experience

LastPass released the findings of an IDC survey which revealed that “balancing company security requirements and the employee user experience” is the number one identity challenge, followed by “employees struggling with too many passwords.”… Continue reading The importance of balancing security requirements and employee user experience

Authorization is bridging the gap between security and IAM

PlainID published a report, based on research conducted among IT and security professionals in North America and the UK. Among its headline findings, the report reveals that authorization is the rising priority in identity and access management (IAM), … Continue reading Authorization is bridging the gap between security and IAM