CyberArk identity authentication biometricsidentity AMaaS identity fraud authentication Stealthbits

3 Ways To Build A Stronger Approach to Identity Protection

Identity-based attacks are a growing concern for organizations of all sizes and industries. Here’s how to protect yourself ...
Security Boulevard
What is OAuth 2.0?

What is OAuth 2.0?

OAuth 2 allows users to grant third-party applications access to their accounts without sharing their passwords ...
FireTail digital identity decentralized Entitle API identity credential theft

Decentralized Identity: Gaining Security and Trust for Digital Identities

Our modern digital world has proven that the current way of managing identity in cyberspace needs to change. If your digital identity is compromised by your activity online, it’s a safe bet ...
Security Boulevard

What Is the Difference Between Authentication and Authorization?

In today’s digital age, online security is a critical concern for individuals and businesses alike. With the increasing amount of sensitive information stored and shared online, it’s essential to have strong security ...
Technical Advisory – Azure B2C – Crypto Misuse and Account Compromise

Technical Advisory – Azure B2C – Crypto Misuse and Account Compromise

Microsoft’s Azure Active Directory B2C service contained a cryptographic flaw which allowed an attacker to craft an OAuth refresh token with the contents for any user account. An attacker could redeem this ...
What is Dynamic Authorization & Why Does it Matter?

What is Dynamic Authorization & Why Does it Matter?

Dynamic authorization rewards customers with the security they need and effectively improves their experience with your brand. It helps to meet your customer’s needs and, at the same time, gives you much ...
zero-trust

Implementing Zero-Trust Security With Service Mesh and Kubernetes

IBM’s recent Cost of a Data Breach report revealed that data breaches cost companies an average of $4.35 million in 2022, up 12.7% from 2020. This report also noted that 79% of ...
Security Boulevard
2022 Emerging IAM Technology Spend

2022 Emerging IAM Technology Spend

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management ...
converged, identity Permiso PAM, cybersecurity, credentials, identity, security, credentials authorization PAM governance digital identity IAM authorization

Next-Generation Authorization for Advanced Access Controls

Authorization is an essential part of any modern enterprise’s identity and access management (IAM) solution. Acting as an organizational gatekeeper, it is the process that determines which employees can access which company ...
Security Boulevard

Forging Australian Driver’s Licenses

The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which ...