Adapting authentication to a cloud-centric landscape

In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how … Continue reading Adapting authentication to a cloud-centric landscape

Lack of visibility into cloud access policies leaves enterprises flying blind

Fragmented access policies are top security concern in multi-cloud environments, with more than 75% of enterprises reporting they do not know where applications are deployed and who has access to them, according to Strata Identity. Cloud security conce… Continue reading Lack of visibility into cloud access policies leaves enterprises flying blind

YubiKey installation and synchronization with on-premise Microsoft AD domain users [closed]

I am running a secure design for a customer where I am required to implement passwordless access to machines by installing a secure smart card architecture that should allow synchronization with on-premise Active Directory domain users.
I … Continue reading YubiKey installation and synchronization with on-premise Microsoft AD domain users [closed]

Passwordless is more than a buzzword among cybersecurity pros

Password security remains highly relevant even as cybersecurity strategies move toward a passwordless future. Of the 100 Black Hat USA 2023 attendees Delinea polled, 54% said passwordless is a viable concept, while 79% agreed that passwords are evolvin… Continue reading Passwordless is more than a buzzword among cybersecurity pros

Building a secure future without traditional passwords

As organizations try to fortify their defenses against an increasingly sophisticated threat landscape, traditional password-based systems reveal their limitations. This is where passwordless authentication steps in – a concept that simplifies access wi… Continue reading Building a secure future without traditional passwords

Zero trust rated as highly effective by businesses worldwide

Zero trust is here to stay, with 82% of experts currently working on implementing zero trust, and 16% planning to begin within 18 months, according to Beyond Identity. Over 90% of those working on zero trust cited that the 2022 Federal Zero Trust Strat… Continue reading Zero trust rated as highly effective by businesses worldwide

Overcoming user resistance to passwordless authentication

Many organizations agree in theory that passwordless authentication is the future, but getting there represents a significant change management challenge. The migration to passwordless requires forethought and planning. For example, an organization nee… Continue reading Overcoming user resistance to passwordless authentication

Small organizations outpace large enterprises in MFA adoption

The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of security and convenience for users, according to Okta. MFA authentication gains traction MFA authentication has steadily gaine… Continue reading Small organizations outpace large enterprises in MFA adoption