VPN & Privacy: What Nobody Told You

VPN & Privacy: What Nobody Told You

Large-scale privacy violations on the web have become commonplace. Social media platforms and app or service providers have been shelling out, some intentionally, others unintentionally, user data to third parties hand over ...
Idaptive Looks to Unify Access Control

Idaptive Looks to Unify Access Control

Idaptive has launched a cloud service that promises to streamline the process of embedding access controls within customer applications. Company CEO Danny Kibel said the Next-Gen Access Cloud combines single single-on (SSO), ...
Security Boulevard
Quick Dissections: Collections 2 - 5

Quick Dissections: Collections 2 – 5

You’ve seen the headlines about a loot archive of stolen credentials called "Collection #1" that was leaked online in January. This collection contains 772,904,991 entries, one of the most significant credential leaks ...
The Emergence of Identity and Access Threat Prevention, as explained by 451 Research

The Emergence of Identity and Access Threat Prevention, as explained by 451 Research

| | identity
Enterprises continue to embrace cloud-based architectures, and cloud services are a significant contributor to a forecasted $3.8 trillion in IT spending this year. But increasingly, organizations are finding the one-size-fits-all cloud approach ...

Protect Classified Information with “Identity Classification”

Gurucul offers machine learning models to address many cyber security scenarios. Up next is… Gurucul Machine Learning Model: Identity Classification How does the Identity Classification machine learning model work, what does it ...
Aadhaar.png

Meet The Big Brother Of India (And Potentially – Others)

via Nikhil Pahwa, reporting for Wired UK, comes a glimpse into an Indian version of Big Brother, in this case, a database monikered Aadhaar, in which is contained the apparently problematically managed ...
The Great Pyramid of CASB

Cornerstone Capabilities of Cloud Access Security Brokers

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) ...
Time for Passwords Came … and Went

The Time for Passwords Came … and Went

After struggling with every combination of your name and your birth year for the perfect username, you’re probably used to this welcoming you on every website you join: Password must contain: One ...
Security Boulevard
5 Key Takeaways from the Gartner IAM Summit

5 Key Takeaways from the Gartner IAM Summit

| | identity
This week, IAM and security professionals came together in Las Vegas for the Gartner Identity and Access Management (IAM) Summit to discuss the top trends and strategies across the IAM landscape in ...
Loading...