iam
On Least Privilege, JIT, and Strong Authorization
I’ve been employed as a security professional for over 20 years. I cannot possibly count the number of times I have uttered the words “least privilege”. It’s like a little ...
Digital Identity Firms Being Bolstered by Investments
Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, ...
Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Huge DNA PII Leak: 23andMe Must Share the Blame
DNA: Do Not Agree. 23andMe says it’s not a breach—just credential stuffing. I’m not so sure ...
Insider Identity Risk to Cloud Security
Identity plays a major role in cloud security and can open the door for serious cybersecurity problems from the inside ...
Visibility is Not Enough to Protect Organizations from Identity Threats
Identity and access management (IAM) has become a critical component of any organization's security strategy. Implementing strict controls over user access and privileges is clearly important for protecting sensitive systems and data ...
The Battle of the Bots: Safeguarding Identity in the Age of AI
In the age of generative AI, identity is being exploited by attackers as a weakness in the security perimeter. Here's what to do ...
Generative AI Adding to the Risks for Embedded Credentials
Everyone wants to make their work processes easier. A step that many developers take to provide simpler access to their workflows is to embed credentials directly into the code. It’s not hard ...
3 Ways To Build A Stronger Approach to Identity Protection
Identity-based attacks are a growing concern for organizations of all sizes and industries. Here’s how to protect yourself ...
What is OAuth 2.0?
OAuth 2 allows users to grant third-party applications access to their accounts without sharing their passwords ...