Identity and Access Management | News, how-tos, features, reviews, and videos
Workflow Studio accelerates global person matching through personally identifiable information (PII) and identity documents.
Microsoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.
Semperis leverages existing identity security capabilities along with a new migration tool, to offer a comprehensive Active Directory transition and consolidation offering.
Compromised user accounts are often the point of entry bad actors use to invade systems; this is why passwordless adoption is getting more attention. CSO lists 10 players to help CISOs make a decision on what works for their enterprise.
Check Point Software will integrate Perimater 81's zero trust network access and rapid deployment technology into its existing Infinity product architecture.
The new phishing campaign targets business executives and uses EvilProxy to defeat multifactor authentication.
Cybercriminals are increasingly using compromise methods that grant “legitimate” access to target systems, making them harder to detect.
Spear-phishing attacks by the Midnight Blizzard advanced persistent threat group targeted Microsoft 365 tenants of small businesses.
A new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.
ConductorOne’s cloud-based privileged access management product will allow security teams to grant just-in-time access to privileged resources.