Identity and Access Management (IAM)
Revolutionize Zero-Trust Security With a Converged Identity Platform
The world of cybersecurity is ever-evolving, and organizations are facing new and complex security challenges every day. The traditional approach to managing identities and access has been fragmented and siloed, with separate ...
IAM Enterprise Temperature Check
Managing the identity ecosystem for enterprises has become increasingly complex over the last two years. From the increase in cybercrime spurred on by the COVID-19 pandemic to the surge in remote work—that ...
The Next Frontier for Identity Governance: Intelligent IGA
When we think about the future, we think of autonomous vehicles, artificial intelligence (AI) and an interconnected metaverse. AI often invokes the dystopian worlds of movies like The Terminator or The Matrix, ...
Survey Surfaces Raft of Cloud Security Challenges
A survey of 154 North American IT and security decision-makers conducted by Forrester Consulting on behalf of Sonrai Security and Amazon Web Services (AWS) published today found 96% of respondents acknowledged their ...
Mismanaged IAM Can Lead to Data Breaches
Without proper identity and access management (IAM) policies in place, organizations run the risk of deploying a wide range of security tools without achieving a comprehensive security stance. This was among the ...
Avoiding Cloud Security Pitfalls
Charlene O’Hanlon and Keith Neilson from CloudSphere talk about the numerous pitfalls enterprises face in keeping their cloud environments secured, including lack of visibility and monitoring for unauthorized or misplaced access, failure ...
Securing Onboarding and Offboarding in the Cloud
One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, ...
NY AG Warns Credential Stuff Compromised 1.1M Accounts
New York Attorney General Letitia James has put 17 companies on notice that 1.1 million online accounts have been compromised by cyberattacks involving credential stuffing. In a “Business Guide for Credential Stuffing ...
When Not to Trust Zero-Trust
Zero-trust is an increasingly popular cybersecurity model. Even the National Security Agency encourages the use of a zero-trust architecture, largely because of its data-centric approach to protecting critical assets across the network ...
Teleport Adds Windows Support to Infrastructure Security Gateway
Teleport today announced that the open source Teleport Access Plane it created to provide IT teams with identity-based access to IT infrastructure is now available for both Windows Desktop and Windows Server ...