Cloud Identity
What is Cloud Identity and its Benefits?
Cloud Identity has emerged as a game-changer in a digitally connected world. Learn how cloud identity simplifies user experiences, enhances security, and enables seamless integration with cloud services. Discover the advantages of ...
How Credential Misuse Threatens Cloud Operations
Cloud-native security is a rapidly evolving section of the industry reacting to the increasing threats unique to organizations that are exclusively or primarily operating on cloud applications and platforms. In a report ...
AirTag Stalking – Murder, Fear and Litigation
At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four ...
Businesses Look to AI, ML to Boost Identity Security
Less than half of businesses are adequately addressing the issue of identity security, despite the growing threat of identity-based attacks, according to a SailPoint survey of more than 300 global cybersecurity executives ...
JumpCloud Adds Decentralized Password Manager to Portfolio
JumpCloud Inc. this week launched a password manager that relies on an alternative approach that stores encrypted credentials locally on user devices and then synchronizes vaults between devices via servers in the ...
The Fall of Passwords and the Rise of Analytics
Every year, millions of organizations and internet users suffer from credential theft and scams perpetrated online. Phishing remains the most common method used by threat actors; stolen passwords and session cookies allow ...
Making Biometrics Work: 3 Ways To Jumpstart the Process
As advances in technology continue to improve the efficiency of work environments, biometric technology has emerged as a crucial part of securing the workplace both logically and physically. The COVID-19 pandemic accelerated ...
Verizon DBIR 2022: What’s Worth Acting On?
When I was a corporate employee responsible for security strategy, I looked forward to the Verizon Data Breach Investigation Report every spring, as it was an essential tool to validate my strategy ...
Mismanaged IAM Can Lead to Data Breaches
Without proper identity and access management (IAM) policies in place, organizations run the risk of deploying a wide range of security tools without achieving a comprehensive security stance. This was among the ...
The Role of Cloud-Based Identities in Cloud Security
Organizations now operate in a multi-cloud world. That allows workers to be more productive and offers the accessibility and scalability that organizations need to keep business operations flowing. But it also creates ...