informa

Identity & Access Management

Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Zero Trust and Access: Protecting the Keys to the Kingdom
Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
December 30, 2021
Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
by Art Poghosyan, CEO, Britive
December 30, 2021
5 min read
Article
Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
December 22, 2021
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
by Mark Settle, Seven-Time CIO
December 22, 2021
5 min read
Article
Zero Trust Shouldn’t Mean Zero Trust in Employees
Some think zero trust means you cannot or should not trust employees, an approach that misses the mark and sets up everyone for failure.
December 20, 2021
Some think zero trust means you cannot or should not trust employees, an approach that misses the mark and sets up everyone for failure.
by Josh Yavor, CISO, Tessian
December 20, 2021
4 min read
Article
Newly Found Authentication Flaws Highlight Dangers of Coding From Scratch
Two vulnerabilities in a call-center software suite could allow an attacker to take over the application server, researchers found.
December 08, 2021
Two vulnerabilities in a call-center software suite could allow an attacker to take over the application server, researchers found.
by Robert Lemos, Contributing Writer
December 08, 2021
4 min read
Article
How Criminals Are Using Synthetic Identities for Fraud
Organizations must improve their cybersecurity protocols to detect fraudulent identities and make sure they're safeguarding their consumers’ personal information.
December 03, 2021
Organizations must improve their cybersecurity protocols to detect fraudulent identities and make sure they're safeguarding their consumers’ personal information.
by Tatiana Walk-Morris, Contributing Writer
December 03, 2021
5 min read
Article
GBG Announces It Has Agreed to Acquire Acuant
GBG announces it has agreed to acquire Acuant, bringing together two leaders in the global digital identity market with combined revenue of c.£265 million.
November 18, 2021
GBG announces it has agreed to acquire Acuant, bringing together two leaders in the global digital identity market with combined revenue of c.£265 million.
November 18, 2021
6 min read
Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
5 min read
Article
What Security Strategies Are Driving InfoSec's Decisions Around Defense?
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.
November 08, 2021
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.
by Dark Reading Staff, Dark Reading
November 08, 2021
2 min read
Article
Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.
November 08, 2021
Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.
by Cristin J. Monahan, Cyber Vault Fellow at National Security Archive
November 08, 2021
5 min read
Article
SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.
November 06, 2021
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.
by Dark Reading Staff, Dark Reading
November 06, 2021
2 min read
Article
How Is Zero Trust Different From Traditional Security?
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
November 04, 2021
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
November 04, 2021
1 min read
Article
Where Is Cloud Permissions Management Headed?
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities
November 03, 2021
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
November 03, 2021
5 min read
Article
Identity-Focused Security Controls Prevail
How identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.
October 27, 2021
How identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.
by Clint Maples, CISO at Robert Half
October 27, 2021
4 min read
Article
SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat
Microsoft says the group has attacked more than 140 service providers and compromised 14 of them between May and October of this year.
October 25, 2021
Microsoft says the group has attacked more than 140 service providers and compromised 14 of them between May and October of this year.
by Jai Vijayan, Contributing Writer
October 25, 2021
6 min read
Article