GPT OpenSSF AI ML Darktrace Concentric supply chain Palo Alto AI partnership ai

The Two Faces of AI in Identity Management

The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...
Security Boulevard
4 Reasons Why SSO Integrations Are a Must-Have For Online Businesses

4 Reasons Why SSO Integrations Are a Must-Have For Online Businesses

The primary goal of single sign-on is to enable users to access many applications with just one set of credentials. This is convenient for the user since they won't have to sign ...
identity governance security Spera deepfake identity management

Spera Unveils Platform for Finding and Tracking Identities

Spera emerged from stealth today to launch a namesake platform that discovers and tracks identities to enable organizations to better enforce zero-trust cybersecurity policies. Fresh from raising $10 million in funding, Spera ...
Security Boulevard

Julie Smith Shares Identity Security Guidance for 2023

TechSpective Podcast Episode 102   Identity security is crucial for effective cybersecurity. When it comes down to it, many attacks are successful because threat actors are able to somehow steal, hack, or ...
Best Practices for Identity and Access Management When Using Google Cloud Provider

Best Practices for Identity and Access Management When Using Google Cloud Provider

At Praetorian, one of our top priorities is looking over each client’s Identity and Access Management (IAM) structure. Several of our large clients use Google Cloud Provider (GCP), which is one of ...
FireTail digital identity decentralized Entitle API identity credential theft

Identity’s Role in API Security

Digital identities play an important role in an organization’s security program. But the idea of “identity” in APIs can be complex, Jeff Williams, CTO and co-founder at Contrast Security, said in an ...
Security Boulevard
Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Identities, Risk and the Multi-Cloud Environment

The multi-cloud environment is having its moment. More organizations are moving applications into the cloud, and a multi-cloud environment offers better redundancy and availability, as well as pushes forward digital transformation. However, ...
Security Boulevard
business, risk, cyber, CRQ, TPRM risk management register

Employees That Circumvent Access Introduce Risk

We are not a patient society, and we are made less patient as technology continues to evolve. Productive business operations thrive on faster internet connections, faster computers, faster applications and so on ...
Security Boulevard
Finally! Windows to Block Password Guessing — by Default

Finally! Windows to Block Password Guessing — by Default

Brute-force guessing of Windows credentials is a common entry point for hackers. After 27 years, Microsoft is finally fixing the dumb default that allows it ...
Security Boulevard
backup, data room data clean visualization data cybersecurity Edge data center privacy Unisys

Defending the Edge Data Center

Edge data centers are challenging for traditional security practitioners, as they tend to turn most established security policies on their heads. For example, instead of having to operate a single “man trap” ...
Security Boulevard