Tag: Identity Management
-
Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats
In today’s rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation …
-
Code Keepers: Mastering Non-Human Identity Management
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human …
-
Why Identity Management is Key in a Cyber Resilience Strategy
Identity compromise is one of the top cyber threats to organizations, prompting cybersecurity professionals to encourage better identity …
-
Blockchain in Identity Management: Securing Personal Data and Identities
Learn how blockchain is transforming digital identity management by empowering individuals with self-sovereign control over personal data …
-
Human vs. Non-Human Identity in SaaS
In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security …
-
6 Ways to Simplify SaaS Identity Governance
With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to identity …
-
Top cloud security trends, challenges and best practices (2024)
For more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber …
-
Unified Identity – look for the meaning behind the hype!
If you’ve listened to software vendors in the identity space lately, you will have noticed that “unified” has quickly become the buzzword …
-
10 Best Privileged Identity Management Tools (2024)
The essence of effective Privileged Identity Management (PIM) lies not in identity or management but in privilege. A robust PIM system …
-
What is Nudge Security and How Does it Work?
In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies …
-
What the savvy security practitioner needs to know about today’s cloud
Cloud is a rapidly changing domain, with new services, architectures and deployment tools to join everything together. Yet, many of the …
-
Lessons learned from the Microsoft Cloud breach
In early July, the news broke that threat actors in China used a Microsoft security flaw to execute highly targeted and sophisticated …
●●●