identity
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
Sysdig today extended the reach of the cloud detection and response platform by adding the ability to correlate identity behavior with workload activity and cloud resources. Maya Levine, a product manager for ...
Security Boulevard
CSMA Starts with Identity A Comprehensive Approach to Modern Cybersecurity
With the rise of AI, NHIs (non-human identities) are booming, and attacks are becoming increasingly identity-first and AI-powered, making them faster, evasive and more sophisticated ...
Security Boulevard
Rezonate Streamlines Identity Security Across IT Environments
Michael Vizard | | Cybersecurity, human ID, identity, identity security, IT Security, non-human ID, zero trust
Rezonate has extended the reach of its platform for managing access to infrastructure to include the credentials that are used by humans alongside the identifies of machines and software components that organizations ...
Security Boulevard
Identity crisis? Manageable. Identity attacks? Crisis!
Don’t let your employees fall prey to identity attacksIn the early internet days, logging in meant entering a username and password. If the password matched what the server had stored, you got in ...
The Ticketmaster Breach – A Never Ending Saga
David Michael Berry | | Breach, Cyber Security, Cybersecurity, DataPrivacyRevolution, David Michael Berry, identity, Identity Theft, security, snowflake, Taylor Swift, technology, Ticketmaster
The Ticketmaster Saga continues, with over 500 Million users personal and financial details compromised. When will we stop playing whack-a-mole and start taking Personal Data Privacy seriously? ...
How Chrome’s Third-Party Cookie Restrictions Affect User Authentication?
Google Chrome has planned to phase out third-party cookies, which will affect different website functionalities depending on third-party cookies. This blog focuses on how this phase-out affects identity and user authentication and ...
Extending the Reach and Capabilities of Digital Signing With Standards
Digital signatures are ideal for addressing today’s challenges, providing the robust security, flexibility and scalability that organizations require for a wide range of use cases ...
Security Boulevard
Compliance, Security and the Role of Identity
While compliance frameworks establish baseline requirements for data protection, they may not always align with the rapidly evolving threat landscape ...
Security Boulevard
Man-In-The-Middle Attacks are Still a Serious Security Threat
Kristina Rodopska | | Cloud, cyberattacks, Cybersecurity, identity, Man In The Middle, mitm, Phishing
Man-in-the-middle attacks have increased in the age of digital connectivity and remote work, forcing companies to develop strategies to mitigate them ...
Security Boulevard
NIST 2.0: Securing Workload Identities and Access
5 min read The updated framework addresses the need to secure non-human identities. Here's how that can extend across the guidance's five key functions. The post NIST 2.0: Securing Workload Identities and ...