identity security

An Enterprise Playbook to Defending Against Volt TyphoonÂ
An identity threat detection approach built on access intelligence is key to identifying and disrupting campaigns like Volt Typhoon. ...
Security Boulevard

How to rationalize IDPs (without painful migrations)
For enterprise CIOs, CISOs, and IT leaders, managing multiple identity providers (IDPs) is a costly, complex, and security-intensive challenge. Whether due to M&A activities, multi-cloud strategies, or regulatory requirements, fragmented identity ecosystems ...

RSA Conference Dispatch: Mr. NHI – Leading the Movement to Expose Cybersecurity’s Biggest Blind Spot!
John D. Boyle | | Cybersecurity, identity security, Mr NHI, NHIs, RSA Conference, RSAC2025, zero trust
RSA Conference Dispatch: Beyond the Briefings. Beneath the Buzz. John Boyle Uncovers and Shares Gems from RSAC 2025 ...
Security Boulevard
Identity security: A critical defense in 2025’s threat landscape
The traditional perimeter is no longer what protects our critical information and systems. In 2025, securing data is dependent on identity. With distributed multi-cloud, multi-IDP environments, the business world is up against ...

Red Canary Report Surfaces Sharp Increase in Cyberattacks Involving Identity
An analysis of 93,000 threats published this week by Red Canary, a provider of a managed detection and response (MDR) service, finds the number of cyberattacks seeking to compromise an identity increased ...
Security Boulevard

Unwrapping BloodHound v6.3 with Impact Analysis
Just in time for the holidays, sharper tools for faster defenseToday, the SpecterOps team rolled out a number of new features, product enhancements, and recommendations intended to help users of BloodHound Enterprise and ...

Recovering From a Breach: 4 Steps Every Organization Should TakeÂ
The reality is, that despite our best efforts, breaches happen. And there’s a lot less information on how to respond versus how to prevent.  ...
Security Boulevard

How to Prepare Identity Stack to Adopt the Zero-Trust Model
The zero-trust model demands robust identity security, which needs continuous verification of individuals and systems ...
Security Boulevard

Navigating the Uncharted: A Framework for Attack Path Discovery
Elad Shamir | | attack path analysis, attack-path-management, clean-source-principle, identity security
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, ...

Overcoming the 5 Biggest Challenges to Implementing Just-in-Time, Just Enough Privilege
Embracing a just-in-time and just-enough privilege approach that harnesses context and automation can remove the tension between security and productivity, enabling teams to run faster without compromising on security standards ...
Security Boulevard