newsNew Fido standard for passkeys will make it easier to change servicesFido Alliance proposes a new standard that makes it possible to use the same passkeys even if you change platform or service.By Mikael Markander16 Oct 20241 minPasswordsIdentity and Access ManagementSecurity news Okta’s new security standard to be adopted by Google, MicrosoftBy Shweta Sharma16 Oct 20243 minsIdentity and Access ManagementSecurityopinion Beware the risks of vulnerable VPNs: update, maintain, monitor, and protectBy Susan Bradley26 Sep 20247 minsThreat and Vulnerability ManagementIdentity and Access ManagementNetwork Security news analysisLLMjacking: How attackers use stolen AWS credentials to enable LLMs and rack up costs for victimsBy Lucian Constantin 20 Sep 20245 minsHackingCloud SecurityIdentity and Access Management newsOracle adds Zero Trust Packet Routing capability to its cloud platformBy Howard Solomon 12 Sep 20246 minsZero TrustCloud SecurityIdentity and Access Management newsApache OFBiz patches new critical remote code execution flawBy Lucian Constantin 09 Sep 20245 minsIdentity and Access ManagementVulnerabilities newsWordPress users not on Windows urged to update due to critical LiteSpeed Cache flawBy Lynn Greiner 23 Aug 20243 minsThreat and Vulnerability ManagementIdentity and Access ManagementVulnerabilities how-to3 key strategies for mitigating non-human identity risksBy Chris Hughes 22 Aug 20246 minsData and Information SecurityIdentity and Access ManagementRisk Management newsDashlane study reveals massive spike in passkey adoptionBy Paul Barker 31 Jul 20245 minsIdentity and Access ManagementSecurity ArticlesfeatureNHIs may be your biggest — and most neglected — security holeBecause IT has so little visibility into non-human identities, attackers are increasingly seeking them out as ultra-easy onramps to everything of value in your enterprise. The solution? Stop treating NHIs as though they are another human end-user.By Evan Schuman 23 Jul 2024 9 minsApplication SecurityIdentity and Access ManagementNetwork SecurityopinionReduce security risk with 3 edge-securing stepsNot sure where you should start to approach risk reduction in your network? If you aren’t aware of any and all risks to your edge access, you’re not reducing risk. By Susan Bradley 01 Jul 2024 6 minsIdentity and Access ManagementRisk ManagementnewsMicrosoft-owned vendor blamed for massive healthcare breachGeisinger said a former Nuance Communications employee with improper access to official records stole critical patient information.By Shweta Sharma 26 Jun 2024 3 minsData BreachIdentity and Access ManagementfeatureWhat are non-human identities and why do they matter?When digital systems need access and permissions they require credentials just like human beings. These non-human identities allow many components of complex systems to work together but present significant security issues.By Chris Hughes 03 Jun 2024 8 minsAccess ControlIdentity and Access ManagementNetwork SecuritynewsOkta alerts customers against new credential-stuffing attacksHackers are using credential-stuffing to attack endpoints that are used to support the cross-origin authentication feature.By Shweta Sharma 31 May 2024 4 minsIdentity and Access ManagementVulnerabilitiesnewsGathid’s new access mapping tech promises affordable and streamlined IAMThrough the directed graph model technology, Gathid will provide organizations with a detailed, real-time inventory of their identities and permissions.By Shweta Sharma 10 Apr 2024 3 minsIdentity and Access ManagementSecurity Softwarenews analysisGoogle Chrome aims to solve account hijacking with device-bound cookiesNew feature is designed to stop bad actors from intrusions that rely on stealing session cookies by using TPM crypto processors to securely store keys locally.By Lucian Constantin 05 Apr 2024 8 minsBrowser SecurityInternet SecurityIdentity and Access ManagementfeatureWhat is identity fabric immunity? Abstracting identity for better securityCISOs struggling to manage a diverse and complex identity access management infrastructure should start thinking about identity fabric immunity.By Matthew Tyson 03 Apr 2024 11 minsCSO and CISOApplication SecurityIdentity and Access ManagementnewsTelesign launches integrated API to combine traditional identity verification channels Verify API will let customers choose any of the seven verification channels to silently verify all end-users.By Shweta Sharma 27 Mar 2024 3 minsAuthenticationIdentity and Access ManagementSecurity SoftwarefeatureRedefining multifactor authentication: Why we need passkeysAs attackers become more adept at defeating authentication apps and IP fencing, passkeys are a more secure and user-friendly alternative.By Joe Stocker 15 Mar 2024 8 minsMulti-factor AuthenticationAuthenticationIdentity and Access ManagementfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom 13 Feb 2024 8 minsDevSecOpsApplication SecurityIdentity and Access ManagementnewsCisco’s identity and access security offerings to receive AI upgradesNew AI-powered identity visibility, along with a few other AI advancements, is expected to improve Cisco’s existing security offerings.By Shweta Sharma 06 Feb 2024 3 minsIdentity and Access Management Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 08 Nov 2024Business OperationsCybercrimeData and Information Security whitepaper Global Cyber Resilience Report 2024 By Cohesity Inc. 08 Nov 2024Business OperationsData and Information SecurityRansomware whitepaper Global Data Insights Survey By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Androxgh0st botnet integrates Mozi payloads to target IoT devices By Lucian Constantin 08 Nov 20245 mins BotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity