Product Update Release Announcement for New REST API Framework and Webhooks 

Today, Authomize announced that we have released an updated version of our REST API framework to enable our customers to connect Authomize’s Cloud Identity and Access Security Platform throughout their environments.  The post Product Update Release Announcement for New REST API Framework and Webhooks  appeared first on Authomize ... Read More

3 Tips for Mitigating the Uber Hack

Rideshare giant Uber found themselves in the headlines yet again last week when news leaked out that they had been hacked.  This is not the first time for the company finding themselves in the headlines for being hacked or controversy.  Based on reporting — much of it coming from the ... Read More
Save $150,000+ and 3000+ Working Hours per Month with Authomize’s Automated Access Reviews*

Save $150,000+ and 3000+ Working Hours per Month with Authomize’s Automated Access Reviews*

When you hear the words “Access Review”, what immediately comes to mind?  For Compliance professionals, the associations will most likely swirl around the energy, time, and budget that go into getting them done — and none of those associations being positive.  The post Save $150,000+ and 3000+ Working Hours per ... Read More

Securing Your Software Supply Chain from Access Privilege Risks

The hacking of SolarWinds continues to reverberate, serving as a wakeup call for organizations to take stronger steps to secure their software supply chains. Here's an analysis of some of the calls for stricter standards and better practices aimed at reducing the risk of malicious activity targeting the supply chain. The ... Read More
3 Trends to Look for at Gartner IAM 2022

3 Trends to Look for at Gartner IAM 2022

The countdown to one of the biggest Identity events of the year has already begun.  With just 10 days to go before the doors open at Gartner IAM in Las Vegas, Identity and Security folks recovering from Black Hat are preparing to descend on the city to attend sessions, network, ... Read More
Overcoming 3 Blindspots to Securing Your Development Pipeline in AWS

Overcoming 3 Blindspots to Securing Your Development Pipeline in AWS

Follow the news of our listing on AWS Marketplace, we took a look at the IAM security challenges facing the development pipeline in maintaining visibility and control throughout cloud environments, running from your IdP to AWS to GitHub. Read our breakdown of the issues and how Authomize breaks down the ... Read More

Clarifications on #PassBleed and the Value of Monitoring the IAM Layer

| | Uncategorized
On Tuesday (July 19 2022) we published our research on the #PassBleed security risks in Okta. Okta’s SVP of Product Management, Arnab Bose, published a very detailed... The post Clarifications on #PassBleed and the Value of Monitoring the IAM Layer appeared first on Authomize ... Read More
Authomize Discovers PassBleed Password Stealing and Impersonation Risks in Okta

Authomize Discovers PassBleed Password Stealing and Impersonation Risks in Okta

Organizations depend on their Identity Providers for managing their identities and access to their apps and services, using them as their trusted management solution for everything from Single Sign-On and Multi-Factor Authentication to directory services and provisioning access. The post Authomize Discovers PassBleed Password Stealing and Impersonation Risks in Okta ... Read More
Okta Customers Exposed to Risk of Password Theft and Impersonation in PassBleed Attacks

Okta Customers Exposed to Risk of Password Theft and Impersonation in PassBleed Attacks

Authomize’s Security Research Lab has uncovered a set of inherent risks in the popular Identity Provider Okta that leave users exposed to potential compromise and exploitation.. The post Okta Customers Exposed to Risk of Password Theft and Impersonation in PassBleed Attacks appeared first on Authomize ... Read More

Treating Healthcare’s Insider Threat

There’s an old joke about why bank robbers rob banks. Because that’s where the money is.  Given the valuable assets under their care, banks, fintech, insurance, and other financial institutions have understood that they have to take special care to avoid data breaches and other threats.  But if the past ... Read More
Loading...