Identity and Access Management

Embracing the Future: Mastering Your Cybersecurity Strategy With an Identity Driven Security Approach
Steven Daniëls | | AI, Cybersecurity, Digital Transformation, generative AI, Identity Driven Security Approach, identity management, SaaS
In today's rapidly evolving digital landscape, taking control of your cybersecurity strategy is more crucial than ever ...
Security Boulevard

Google Cloud’s Multi-Factor Authentication Mandate: Setting a Standard or Creating an Illusion of Security?
Google Cloud recently announced that it will require all users to adopt multi-factor authentication (MFA) by the end of 2025, joining other major cloud providers like Amazon Web Services (AWS) and Microsoft ...
Security Boulevard

Delinea Extends Scope of Identity Management Platform
Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the ...
Security Boulevard

The Path of Least Resistance to Privileged Access Management
PAM aims to provide a privileged identity-centric approach to controlling access as part of the bigger identity ecosystem ...
Security Boulevard

Julianna Lamb on Choosing Authentication Platforms Over DIY
Stytch CTO Julianna Lamb explains why, when it comes to authentication, most organizations are going to be better off relying on a platform than trying to manage these processes at scale themselves ...
Security Boulevard

GitGuardian Extends Reach to Manage Non-Human Identities
GitGuardian today extended the reach of its ability to manage applications secrets into the realm of non-human identities (NHI) associated with machines and software components ...
Security Boulevard

Why RBAC is Still a Big Deal in 2024
For many experts, the verdict is that RBAC remains a big deal because it delivers on two crucial fronts: It keeps organizations secure while enabling them to remain agile and innovative. In ...
Security Boulevard

Securing SMBs in a Cloud-Driven World: Best Practices for Cost-Effective Digital Hygiene Through Verified Authentication
Hackers are acutely aware that basic corporate account credentials present a significant vulnerability, increasing the stakes for SMBs in particular ...
Security Boulevard

CISOs Should Be Directing IAM Strategy — Here’s Why
Umaimah Khan | | CISO, Cybersecurity, iam, identity and access management, least privilege, security
By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy ...
Security Boulevard

Apple Enrages IT — 45-Day Cert Expiration Fury
Richi Jennings | | 90-day certificates, 90-day TLS certificate validity, Apple, Apple Safari, browser, Browser Security, CA/B Forum, CA/Browser Forum, CAB Forum, certificate, Certificate and Key Lifecycle Management, Certificate and Key Management, Certificate Automation, mobile safari, Safari, SB Blogwatch, Sectigo
CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators ...
Security Boulevard