The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Identity & Access Management
Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools & technologies for security teams.
Why Identity Management Is the Key to Stopping APT Cyberattacks
Dark Reading News Desk: CrowdStrike's Adam Meyers talks China, Iran, Russia, and more in this expert dive into the current APT threat actor landscape.
September 14, 2023
Dark Reading News Desk: CrowdStrike's Adam Meyers talks China, Iran, Russia, and more in this expert dive into the current APT threat actor landscape.
by Becky Bracken, Editor, Dark Reading
September 14, 2023
7 MIN READ
Video
Hackers Target High-Privileged Okta Accounts via Help Desk
Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization.
September 05, 2023
Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization.
by Elizabeth Montalbano, Contributor, Dark Reading
September 05, 2023
4 MIN READ
Article
Paramount, Forever 21 Data Breaches Set Stage for Follow-on Attacks
The Forever 21 breach alone affects a half-million people, who could be a mix of consumers and employees; Paramount is staying mum on who exactly is impacted.
August 31, 2023
The Forever 21 breach alone affects a half-million people, who could be a mix of consumers and employees; Paramount is staying mum on who exactly is impacted.
by Tara Seals, Managing Editor, News, Dark Reading
August 31, 2023
2 MIN READ
Article
Piles of Unpatched IoT, OT Devices Attract ICS Cyberattacks
Industrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
August 03, 2023
Industrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
by Becky Bracken, Editor, Dark Reading
August 03, 2023
2 MIN READ
Article
Rogue Azure AD Guests Can Steal Data via Power Apps
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
July 14, 2023
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
by Ericka Chickowski, Contributing Writer, Dark Reading
July 14, 2023
5 MIN READ
Article
Okta, Ping Identity, CyberArk & Oracle Lead the IDaaS Omdia Universe
Omdia has published its Omdia Universe on IDaaS. This vendor comparison study highlights the capabilities of the vendors in the space.
July 13, 2023
Omdia has published its Omdia Universe on IDaaS. This vendor comparison study highlights the capabilities of the vendors in the space.
by Don Tait, Senior Analyst, Omdia
July 13, 2023
5 MIN READ
Article
Cybersecurity Is the Healthcare Your Organization Needs
Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see.
June 29, 2023
Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see.
by Jack Danahy, Vice President of Strategy and Innovation, NuHarbor Security
June 29, 2023
4 MIN READ
Article
Decoding Identity and Access Management for Organizations and Consumers
Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.
June 19, 2023
Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.
by Jonathan Care, Contributing Writer, Dark Reading
June 19, 2023
5 MIN READ
Article
PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
June 02, 2023
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
by Tara Seals, Managing Editor, News, Dark Reading
June 02, 2023
4 MIN READ
Article
Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
May 30, 2023
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
by Dark Reading Staff, Dark Reading
May 30, 2023
2 MIN READ
Article
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
May 26, 2023
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
by Dark Reading Staff, Dark Reading
May 26, 2023
1 MIN READ
Article
Close the Permissions Gap With Identity and Access Management for Multicloud Workforces
Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)
April 07, 2023
Consolidating identity management on one platform gives organizations real-time access management for all identities on hybrid and multicloud installations. (First of a two-part series.)
by Microsoft Security, Microsoft
April 07, 2023
3 MIN READ
Article
Is Decentralized Identity About to Reach an Inflection Point?
Decentralized identity products are increasingly projected to be introduced to the market in the next couple of years.
March 31, 2023
Decentralized identity products are increasingly projected to be introduced to the market in the next couple of years.
by Don Tait, Senior Analyst, Omdia
March 31, 2023
3 MIN READ
Article
Using Observability to Power a Smarter Cybersecurity Strategy
With an infrastructure for observability, security teams can make better decisions about access and identity-based threats.
March 29, 2023
With an infrastructure for observability, security teams can make better decisions about access and identity-based threats.
by Dan Conrad, AD Security and Management Team Lead, One Identity
March 29, 2023
5 MIN READ
Article
GitHub's Private RSA SSH Key Mistakenly Exposed in Public Repository
GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
March 24, 2023
GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
by Dark Reading Staff, Dark Reading
March 24, 2023
1 MIN READ
Article