access management
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Lack of CLM maturity is putting organizations at risk
More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
What’s holding back zero trust implementation for device access?
A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094938/ai1-400x200.jpg)
Why machine identities matter (and how to use them)
The migration of everything to the cloud and corresponding rise of cyberattacks, ransomware, identity theft and digital fraud make clear that secure access to computer systems …
![red teaming](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093618/red_teaming-400x200.jpg)
Cybersecurity Red Team 101
“Red Team” is an expression coined in the 19th century, related to German military preparedness exercises conducted as realistic board games between two adversaries operating …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
How to contain a privileged access breach and make sure it doesn’t happen again
When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/29093807/passwordless_hns2-400x200.jpg)
What is fueling the adoption of passwordless authentication?
An identity and access management research report from Enterprise Strategy Group (ESG), finds organizations, frustrated with poor user experience and weak security, are moving …
![Alissa Knight](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/01101152/alissa_knight_2-knightink-400x200.jpg)
SDP solutions are true ZTNA solutions: They trust no one
In this interview with Help Net Security, Alissa Knight, cybersecurity influencer and partner at Knight Ink, explains why organizations should switch to SDP as opposed to VPN, …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102841/access-400x200.jpg)
Authorization is bridging the gap between security and IAM
PlainID published a report, based on research conducted among IT and security professionals in North America and the UK. Among its headline findings, the report reveals that …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …
![Miles Hutchinson](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/07095348/miles_hutchinson_2-jumio-400x200.jpg)
Why identity and access management strategies need a booster
In this interview with Help Net Security, Miles Hutchinson, CISO of Jumio, talks about the pain points of identity and access management and the importance of strenghtening …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093819/work-400x200.jpg)
Understaffing persistently impacting enterprise privacy teams
A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …
![identify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113950/identify-credentials-374x200.jpg)
Reducing the blast radius of credential theft
Cybersecurity has come to be defined by identity, with almost every attack today revolving around gaining control of a user’s identity as a means of accessing critical data …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD