Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Introducing Real-Time Identity-Centric Risk Profile – Designed to Help You Outpace Your Attackers

Identities face relentless threats, with attackers often outpacing defenders in speed. Their rapid tactics give them a breakout time of 84 minutes (according to CrowdStrike’s 2024 Global Threat Report1), making the fallout ...

10 Takeaways from the 2024 Gartner IAM Summit UK  

I had the privilege of attending the Gartner IAM Summit in London. The conference focused on one of the most critical aspects of our digital world: identity-first security. After having some time to ...
Okta Breach Analysis  I   RevealSecurity

Microsoft Azure Security Breach Underscores the Need for Identity Threat Detection

| | ITDR
By Adam Koblentz Earlier this month, Proofpoint’s cloud security response team shared their analysis of an ongoing campaign against Microsoft Azure customers, targeting hundreds of employees across different customer environments, ranging from ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...
😉

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of Gartner’s ...

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity threat actors ...
Okta ThreatInsight settings

Top 10 Features to Enhance Your Okta Security Posture 

We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks. The post Top 10 Features to Enhance ...

Closing the Identity Threat Detection Gap: The Okta Support Unit Breach Revisited

| | insider threat, ITDR
Revisit what happened at Okta, what the impacts were to both Okta and its customers, and how a more sophisticated approach to identity threat detection may have led to a very different ...

Letter from Authomize’s CEO on Acquisition by Delinea

| | ciem, Cloud Security, ITDR
Good news everyone, Authomize has been acquired by Delinea.   After four years of building Authomize, we are thrilled to say that we’ve found the right partner to help us in the next ...
Timeline of Microsoft Breach by Russian Hackers

Behind The Breach: Microsoft Breach by Russian Hackers

On 12 January 2024, Microsoft disclosed a critical breach carried out by Russian state-sponsored group, Midnight Blizzard. The threat actor used a password-spraying attack to gain unauthorized access to Microsoft Corporation’s Office ...

Secure Guardrails