iam
The Battle of the Bots: Safeguarding Identity in the Age of AI
In the age of generative AI, identity is being exploited by attackers as a weakness in the security perimeter. Here's what to do ...
Security Boulevard
Generative AI Adding to the Risks for Embedded Credentials
Sue Poremba | | code security, credentials, iam, identity and access management, Secrets, Source Code
Everyone wants to make their work processes easier. A step that many developers take to provide simpler access to their workflows is to embed credentials directly into the code. It’s not hard ...
Security Boulevard
3 Ways To Build A Stronger Approach to Identity Protection
Identity-based attacks are a growing concern for organizations of all sizes and industries. Here’s how to protect yourself ...
Security Boulevard
What is OAuth 2.0?
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Authentication, authorization, CIAM, Digital Identity, iam
OAuth 2 allows users to grant third-party applications access to their accounts without sharing their passwords ...
A Policy of All Privileged Accounts – Overkill or Common Sense?
An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard
CyberArk Survey Surfaces Identity Security Challenges
A global survey of 2,300 security decision-makers published today by CyberArk, a provider of a privileged access management (PAM) platform, finds that while there is a much greater appreciation for the need ...
Security Boulevard
How to Manage Risks Associated with Identity and Access Management?
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Best Practices, Digital Identity, iam, readwrite
Learn how to effectively manage risks associated with identity and access management with the comprehensive guide. Discover best practices, tools, and strategies to safeguard your organization's sensitive data and prevent security breaches ...
The Developer’s Guide to Mobile Authentication
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Authentication, CIAM, Digital Identity, iam, readwrite
Looking for a comprehensive guide to mobile authentication? Look no further than our Developer's Guide! Learn how to secure your mobile apps with the latest authentication techniques and best practices. From biometric ...
The Gateway to a Streamlined Digital World: Your Single Sign-On Masterclass
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Authentication, Digital Identity, Digital Transformation, iam, masterclass, single sign on
Discover how Single Sign-On (SSO) is revolutionizing digital identity management. Learn about the benefits of SSO and how it is changing the game for businesses and users alike. Stay ahead of the ...
E-Commerce Cybersecurity Trends to Watch in 2023
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | CIAM, Cyber Security, Digital Identity, ecommerce, iam
With the e-commerce market experiencing a surge in demand over the past couple of years, specific security threats that require adequate attention have lingered ...