#identity-security

[ follow ]
#ai-agents
#agentic-ai
Information security
fromComputerWeekly.com
1 week ago

Why it takes 11 hours to resolve one ID-related cyber incident | Computer Weekly

Fragmented, opaque enterprise environments cause identity-related incidents to average 11 hours to resolve, enabling attackers to pivot and escalate privileges rapidly.
#cybersecurity
fromSecurityWeek
2 weeks ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

fromSecurityWeek
2 weeks ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

fromThe Hacker News
3 weeks ago

How to Gain Control of AI Agents and Non-Human Identities

Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks around the clock. They're not new. But they're multiplying fast. And most weren't built with security in mind. Traditional identity tools assume intent, context, and ownership. Non-human identities have none of those.
Information security
Information security
fromTechzine Global
1 month ago

Rubrik and CrowdStrike expand identity security with rollback feature

Rubrik and CrowdStrike integrated detection with rollback recovery to detect identity attacks and restore identity systems to a secure, immutable state.
#zero-trust
fromChannelPro
1 month ago

Okta acquires Axiom Security to enhance privileged access management

In an announcement, Okta's chief technology officer Abhi Sawant said the addition of Axiom will help solve more use cases through additional security controls and connectors to critical infrastructure resources such as databases and Kubernetes. "Axiom's technology will be integrated into Okta Privileged Access, expanding access controls to more sensitive resources that Okta customers can use to further strengthen their identity security fabric, so they can manage the types of privileged access across resources and use cases in their environment," he explained.
Information security
Information security
fromTheregister
1 month ago

Report declares 'identity crisis' amid rising login attacks

Security leaders increasingly distrust identity providers due to complexity, poor visibility, inadequate MFA coverage, and rising credential-focused attacks.
Information security
fromIT Pro
1 month ago

Cyber teams are struggling to keep up with a torrent of security alerts

Identity-related alerts require 11 person-hours to investigate on average, while fragmented identity systems and AI-driven credential theft sharply increase breach risk.
Privacy professionals
fromIT Pro
2 months ago

Identity security is more important than ever - here's why

Organizations recognize the importance of identity security for AI agents, but many lack effective management strategies.
Information security
fromThe Hacker News
4 months ago

Identity Security Has an Automation Problem-And It's Bigger Than You Think

Identity security is compromised by human error, with less than 4% of organizations fully automating identity workflows.
Automation gaps in identity security lead to vulnerabilities, as human reliance increases the risk of breaches.
Privacy professionals
fromThe Hacker News
5 months ago

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Identity systems face vulnerabilities beyond traditional authentication methods, necessitating comprehensive lifecycle protection.
Attackers increasingly use social engineering and advanced technologies, like deepfakes, to compromise identity systems.
fromTechzine Global
5 months ago

Permiso links risk management to threat detection with new platform

Permiso's platform uniquely addresses identity threats by combining risk management with comprehensive monitoring of both human and non-human identities across environments.
Privacy professionals
[ Load more ]