Trust but Verify — How to Secure Identity Provider Trust Relationships

Trust but Verify — How to Secure Identity Provider Trust Relationships

Despite their best intentions, organizations find themselves contending with all too common admin sprawl throughout their apps and environments, leaving them with far more admins than they can handle securely... The post ...
Spike in number of failed logins month view

Authomize Research on Post-Holiday Account Takeovers

Discover the motives and behavior of cyber criminals and how to protect yourself with Authomize's Identity Threat Detection and Response (ITDR) platform. The post Authomize Research on Post-Holiday Account Takeovers appeared first ...

Okta’s Source Code Stolen in GitHub Breach

| | Breach, IdP Security, ITDR, Okta
Okta’s source code was stolen in a breach of their GitHub repos, marking the 2nd significant attack on this critical IAM provider. Read how to secure your Okta with ITDR. The post ...

Lapsus$’s Breaches — A Wake Up Call for Defense of Identity in Depth

Okta, Uber, Rockstar, Samsung, Microsoft, Ubisoft, and others have all found themselves in the headlines for having been breached by the Lapsus$ crew. Claiming to be a couple of teens, this group ...
identity theft IDV Strata identity segmentation IAM fraud JumpCloud

So Your Identity Was Stolen: What To Do and How To Recover

If your identity was stolen, you’re not alone. Over 1.4 million cases of identity theft were reported to the Federal Trade Commission in 2021. And unfortunately, it’s only becoming more common. Identity ...
Security Boulevard

3 Tips for Mitigating the Uber Hack

Rideshare giant Uber found themselves in the headlines yet again last week when news leaked out that they had been hacked.  This is not the first time for the company finding themselves ...
chinese China with GE’s Intellectual Property

Chinese PII Breach: It Hits Differently There

The recent Shanghai Police PII breach, disclosed publicly by ChinaDan, stands up to the claim that it was, according to early reports, the single largest theft of personal data to date; perhaps ...
Security Boulevard

This was H1 2022 – Part 1 – The Fight Against Cybercrime

After many long lockdowns, the information technology industry woke up to a new reality. Cyber crime was too widespread and heavily resourced. Hybrid architectures had grown too complex to be able to ...

Treating Healthcare’s Insider Threat

There’s an old joke about why bank robbers rob banks. Because that’s where the money is.  Given the valuable assets under their care, banks, fintech, insurance, and other financial institutions have understood ...
Hackers Movie Clip Zero Cool (Dade) hacks into TV Station

3 Access Security Lessons Learned from the Marriott Data Breach

For the third time in less than five years, international hotel corporation Marriott is back in the news with yet another data breach. Marriott was the victim of a social engineering attack ...

Secure Guardrails