Okta Breach Analysis  I   RevealSecurity

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response

Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...
Timeline of Microsoft Breach by Russian Hackers

Behind The Breach: Microsoft Breach by Russian Hackers

On 12 January 2024, Microsoft disclosed a critical breach carried out by Russian state-sponsored group, Midnight Blizzard. The threat actor used a password-spraying attack to gain unauthorized access to Microsoft Corporation’s Office ...
Augmenting Legacy Controls with AI-driven Threat Detection and Response

Augmenting Legacy Controls with AI-driven Threat Detection and Response

As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their ...
MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations

MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations

According to recent studies, over 80% of data breaches are attributed to compromised credentials, highlighting the critical need for robust identity threat detection solutions ...
Proactive Defense: The Importance of Analyzing User Identity Data in a Zero Trust Framework

Proactive Defense: The Importance of Analyzing User Identity Data in a Zero Trust Framework

User identity data is a fundamental piece of safeguarding sensitive information, critical systems, and digital assets. Understanding and monitoring how users interact with technology, their access patterns, authentication habits, and overall digital ...
Unmasking the Challenge: Why Identity Threats are Hard to Detect and How Advanced Behavioral Detection Analytics with AI Can Help

Unmasking the Challenge: Why Identity Threats are Hard to Detect and How Advanced Behavioral Detection Analytics with AI Can Help

We explore why identity threats are so hard to detect, the limitations of legacy threat detection solutions, the types of identity threats organizations face, recent examples of identity breaches, and the role ...
Insights and Trends from Gartner Emerging Tech Impact Radar: Security

Insights and Trends from Gartner Emerging Tech Impact Radar: Security

Gartner recently released their annual Emerging Tech Impact Radar: Security. This report analyzes 23 emerging technologies and trends that will shape the future of cybersecurity products and services. It provides insights to ...
AI, identity, FraudGPT identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

Taking Stock of Identity Solutions in the Age of AI

Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI ...
Security Boulevard
Bridging the Gaps: Why ITDR is the Missing Link in Identity Protection

Bridging the Gaps: Why ITDR is the Missing Link in Identity Protection

In our newest eBook, we discuss the limitations of relying on endpoint alone for identifying and addressing identity-based threats and explore the importance of adopting a multi-layered approach and the right ITDR ...
2022 Emerging IAM Technology Spend

2022 Emerging IAM Technology Spend

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management ...

Secure Guardrails