#identity-management

[ follow ]
#cybersecurity
Information security
fromSecuritymagazine
2 months ago

Cybersecurity risks organizations need to address this year

Organizations must pivot to an asset-centric security model to protect digital assets from modern threats.
The reliance on outdated perimeter security leaves critical assets exposed to severe risks.
Tech industry
fromTechzine Global
1 month ago

Rubrik expands to AWS, Oracle Cloud Infrastructure and OpenShift

Rubrik expands its protection suite to major cloud platforms, enhancing security against cyber attacks in hybrid environments.
Digital life
fromComputerWeekly.com
1 week ago

Rethink authentication to remove the burden on users | Computer Weekly

The Snowflake breach underlines the critical need for stronger authentication methods beyond user reliance.
Information security
fromSecuritymagazine
2 months ago

Cybersecurity risks organizations need to address this year

Organizations must pivot to an asset-centric security model to protect digital assets from modern threats.
The reliance on outdated perimeter security leaves critical assets exposed to severe risks.
Tech industry
fromTechzine Global
1 month ago

Rubrik expands to AWS, Oracle Cloud Infrastructure and OpenShift

Rubrik expands its protection suite to major cloud platforms, enhancing security against cyber attacks in hybrid environments.
Digital life
fromComputerWeekly.com
1 week ago

Rethink authentication to remove the burden on users | Computer Weekly

The Snowflake breach underlines the critical need for stronger authentication methods beyond user reliance.
more#cybersecurity
fromTechzine Global
1 month ago
Online Community Development

WSO2 Identity Server 7.1 tackles IAM challenges

WSO2 Identity Server 7.1 enhances identity management by using AI to accelerate deployments and simplify user authentication and customization.
Privacy technologies
fromArs Technica
1 month ago

1Password offers geo-locating help for bad apps that constantly log you out

Using nearby logins in 1Password enhances convenience amid identity issues.
1Password addresses challenges of linking logins to various apps.
Information security
fromITPro
1 month ago

12,000 API keys and passwords were found in a popular AI training dataset - experts say the issue is down to poor identity management

The exposure of nearly 12,000 valid secrets in AI training datasets reveals significant vulnerabilities in identity management practices.
fromTechzine Global
2 months ago
Information security

CyberArk and SentinelOne join forces for better identity security

The integration of CyberArk and SentinelOne enhances identity and endpoint security through improved detection and response capabilities.
#data-breaches
fromTechRepublic
4 months ago
Information security

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

Enterprises in Australia and APAC must phase out long-lived credentials to mitigate significant cloud security risks, as they remain a serious threat.
fromComputerWeekly.com
5 months ago
Information security

IAM: Enterprises face a long, hard road to improve | Computer Weekly

Effective identity and access management (IAM) is crucial for balancing security and ease of use in enterprises.
fromTechRepublic
4 months ago
Information security

Are Long-Lived Credentials the New Achilles' Heel for Cloud Security?

Enterprises in Australia and APAC must phase out long-lived credentials to mitigate significant cloud security risks, as they remain a serious threat.
fromComputerWeekly.com
5 months ago
Information security

IAM: Enterprises face a long, hard road to improve | Computer Weekly

Effective identity and access management (IAM) is crucial for balancing security and ease of use in enterprises.
more#data-breaches
Privacy professionals
fromThe Hacker News
5 months ago

Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities

Corporate identity is the new perimeter for data security, but many enterprises overlook how identities are managed across platforms, increasing vulnerability.
fromAmazic
6 months ago
DevOps

10 ways to automate IAM processes to enhance security and governance in the cloud - Amazic

Automation of IAM processes addresses inefficiencies and security risks in dynamic cloud environments, highlighting the need for modern, scalable solutions.
Privacy professionals
fromCoindesk
9 months ago

Worldcoin Hires Former Google, X and Apple Execs to Beef Up Privacy, Security

Hiring seasoned executives to strengthen privacy, security, and identity management in decentralized identity project.
[ Load more ]