identity threats

JumpCloud Acquires Stack Identity to Extend Access Management Reach
JumpCloud this week revealed it has acquired Stack Identity to fuel an effort to add identity security and access visibility capabilities to its directory ...
Security Boulevard

Why SaaS Identity Abuse is This Year’s Ransomware
Hanan Rasool | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, machine learning, Reveal Security, SaaS Security
By Adam Koblentz Ransomware targeting endpoints and on-premises IT infrastructure has been a primary battleground for enterprise security teams in recent years. One of the highest-profile threat actor groups in this space ...

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
Hanan Rasool | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, machine learning, Reveal Security, SaaS Security
By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Hanan Rasool | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, machine learning, Reveal Security, SaaS Security
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...

Why SaaS Identity Abuse is This Year’s Ransomware
Katie Sanchez | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
Let’s explore some of the details behind this escalating threat to SaaS applications, what may be driving it, and what you can do to better protect your SaaS footprint from these types ...

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
Adam Koblentz | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Katie Sanchez | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...
Identity Protection Action Items Following Midnight Blizzard Attack
In light of the Midnight Blizzard’s attack, it’s evident that our cybersecurity strategies must evolve to keep pace with the sophisticated tactics employed by nation-state actors. This particular breach, initiated through a ...
Identity Protection Can’t be Taken for Granted Anymore
Yiftach Keshet | | executive, identity attack surface, Identity Protection Spotlight, identity threats, MFA, osterman, PAM, service accounts
The findings in report challenge the implicit trust that the purchase and deployment of an identity security solution equals protection The post Identity Protection Can’t be Taken for Granted Anymore appeared first ...