identity cyberattacks ransomware

Revolutionize Zero-Trust Security With a Converged Identity Platform

The world of cybersecurity is ever-evolving, and organizations are facing new and complex security challenges every day. The traditional approach to managing identities and access has been fragmented and siloed, with separate ...
Security Boulevard
IAM identity access management GDPR Affects IAM Usage

IAM Enterprise Temperature Check

Managing the identity ecosystem for enterprises has become increasingly complex over the last two years. From the increase in cybercrime spurred on by the COVID-19 pandemic to the surge in remote work—that ...
Security Boulevard
digital identity, organizations, IGA driver's license identity verification

The Next Frontier for Identity Governance: Intelligent IGA

When we think about the future, we think of autonomous vehicles, artificial intelligence (AI) and an interconnected metaverse. AI often invokes the dystopian worlds of movies like The Terminator or The Matrix, ...
Security Boulevard
CNAPP cloud security palo alto networks Deloitte Broadcom report cloud security threat

Survey Surfaces Raft of Cloud Security Challenges

A survey of 154 North American IT and security decision-makers conducted by Forrester Consulting on behalf of Sonrai Security and Amazon Web Services (AWS) published today found 96% of respondents acknowledged their ...
Security Boulevard
authentication security IAM privacy cloud security Biometrics: Giving the Government the Finger

Mismanaged IAM Can Lead to Data Breaches

Without proper identity and access management (IAM) policies in place, organizations run the risk of deploying a wide range of security tools without achieving a comprehensive security stance. This was among the ...
Security Boulevard
Lacework ABAC Axiomatics Cado Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Avoiding Cloud Security Pitfalls

Charlene O’Hanlon and Keith Neilson from CloudSphere talk about the numerous pitfalls enterprises face in keeping their cloud environments secured, including lack of visibility and monitoring for unauthorized or misplaced access, failure ...
Security Boulevard
onboarding First Amendment

Securing Onboarding and Offboarding in the Cloud 

One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle.  This priority comes into sharpest focus with offboarding users—or, more accurately, ...
Security Boulevard
passwordless, future, passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

NY AG Warns Credential Stuff Compromised 1.1M Accounts

New York Attorney General Letitia James has put 17 companies on notice that 1.1 million online accounts have been compromised by cyberattacks involving credential stuffing. In a “Business Guide for Credential Stuffing ...
Security Boulevard
digital, security, risk, zero-trust zero trust

When Not to Trust Zero-Trust

Zero-trust is an increasingly popular cybersecurity model. Even the National Security Agency encourages the use of a zero-trust architecture, largely because of its data-centric approach to protecting critical assets across the network ...
Security Boulevard
Biden cybersecurity maritime China

Teleport Adds Windows Support to Infrastructure Security Gateway

Teleport today announced that the open source Teleport Access Plane it created to provide IT teams with identity-based access to IT infrastructure is now available for both Windows Desktop and Windows Server ...
Security Boulevard