Identity Management

Identity Management

Unlocking the Secrets of Non-Human Identities

TechSpective Podcast Episode 136   There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...
Microsoft Google 2FA MFA Azure

Mandatory MFA is Coming to Microsoft Azure

Microsoft is making MFA mandatory for signing into Azure accounts, the latest step in the IT vendor's Secure Future Initiative that it expanded in May in the wake of two embarrassing breaches ...
Security Boulevard
identity, verification, FireTail digital identity decentralized Entitle API identity credential theft

The Essential Guide to Evaluating Competitive Identity Verification Solutions

Amid customer and regulatory pressure and intensifying cyberattacks, organizations must ensure their identity verification strategies match up against AI-powered fraud techniques ...
Security Boulevard
China, threats, scams, CISA TP-Link Volt Typhoon

Lawmakers Ask for Probe of Chinese Router Maker TP-Link

Two U.S. lawmakers are asking the Commerce Department to investigate whether the Wi-Fi routers built by Chinese company TP-Link could be used by Chinese-sponsored threat groups to infiltrate U.S. government and private ...
Security Boulevard
Going Passwordless: 6 Tips to Navigate Passkey Adoption

Going Passwordless: 6 Tips to Navigate Passkey Adoption

By now, most of us realize that passkeys and passwordless authentication beat passwords in nearly every way — they’re more secure, resist phishing and theft, and eliminate the need to remember and ...
North Korea

WTH? DPRK WFH Ransomware Redux: 3rd Person Charged

North Korean army of remote IT workers enabled by Matthew Isaac Knoot, alleges DoJ ...
Security Boulevard
North Korea fake IT worker scam PCs

DOJ Shuts Down Another North Korean ‘Laptop Farm’

The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program ...
Security Boulevard
CISOs, least privilege, cybersecurity, challenges, risks,

Overcoming the 5 Biggest Challenges to Implementing Just-in-Time, Just Enough Privilege

Embracing a just-in-time and just-enough privilege approach that harnesses context and automation can remove the tension between security and productivity, enabling teams to run faster without compromising on security standards ...
Security Boulevard
situational, awareness, Wyze connected camera

 How Situational Awareness Enhances the Security of Your Facility

Situational awareness means what is happening around you, making educated judgments, and responding appropriately to any given scenario. It can be helpful on an individual level and also to organizations for making ...
Security Boulevard
google wiz cloud security

Humans are Top Factor in Cloud Security: CSA Study

A study by the CSA found that the human element continues to play a key role in the top threats facing cloud computing environments, including misconfigurations, IAM, and insecurity interfaces and APIs ...
Security Boulevard

Application Security Check Up