ITDR

Compliance, Security and the Role of Identity
While compliance frameworks establish baseline requirements for data protection, they may not always align with the rapidly evolving threat landscape ...
Security Boulevard

Why SaaS Identity Abuse is This Year’s Ransomware
Katie Sanchez | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
Let’s explore some of the details behind this escalating threat to SaaS applications, what may be driving it, and what you can do to better protect your SaaS footprint from these types ...

Snowflake and the Continuing Identity Threat Detection Gap Across SaaS and Cloud
Adam Koblentz | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
By Adam Koblentz In recent weeks, a new wide-scale identity security incident has been unfolding that is refocusing the spotlight on important questions such as: Why are account takeover, credential misuse, and ...
Top 5 Evaluation Criteria For Choosing The Right ITDR Tool
Yiftach Keshet | | Blog, Combatting Identity Threats, identity threat protection, ITDR, threat detection, threat protection
Identity is now a top priority for security decision makers. The need to overcome malicious TTPs, such as credential access, privilege escalation and lateral movement, has never been more urgent. When over ...
Best Practices for Active Directory Backup
Sean Deuby | Principal Technologist | | Active Direcctory backup, Active Directory, Active Directory Backup & Recovery, ad security, ADFR, ITDR
Maintaining business continuity during and after a cyberattack has become a chief strategic objective, not just for enterprise cybersecurity, but for IT and business leadership as well. Effective Identity Threat... The post ...

Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Katie Sanchez | | application detection and response, Application Security, applications, identity threat detection and response, identity threats, insider threat, ITDR, machine learning, SaaS Security
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular basis. Threat actors prefer breaking into organizations using legitimate credentials so they can achieve their goals ...

Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers
Ori Amiga | | Identity Centric, identity management, Identity Security Posture Management, ISPM, ITDR, Market, Product
Identities face relentless threats, with attackers often outpacing defenders in speed. Their rapid tactics give them a breakout time of 84 minutes (according to CrowdStrike’s 2024 Global Threat Report1), making the fallout ...
10 Takeaways from the 2024 Gartner IAM Summit UK
Roy Akerman | | Cool Vendor, Gartner, identity management, Identity Security Posture Management, Identity-First Security, ITDR, Market, Product, research, security
I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...

Microsoft Azure Security Breach Underscores the Need for Identity Threat Detection
By Adam Koblentz Earlier this month, Proofpoint’s cloud security response team shared their analysis of an ongoing campaign against Microsoft Azure customers, targeting hundreds of employees across different customer environments, ranging from ...

A Guide to the Gartner IAM Summit in London
Rezonate | | identity management, Identity provider, Identity-First Security, ITDR, Market, research, security, Technical
Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...