access management
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
65% of organizations continue to rely on shared logins
As organizations look to embrace modern approaches to security in 2022, a strongDM survey has revealed that access management is one of the most crucial factors to achieving …
![Oded Hareven](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/19114849/oded_hareven_2-akeyless-400x200.jpg)
The importance of securing machine-to-machine and human-to-machine interaction
In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid …
![David Mahdi](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/17094451/david_mahdi_2-sectigo-400x200.jpg)
When protecting and managing digital identities, orchestration and automation are critical
In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094843/person-400x200.jpg)
Consumer IAM market to reach $17.6 billion by 2026
The global consumer IAM market is projected to grow from $8.6 billion in 2021 to $17.6 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 15.3% during the forecast …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Unused identities: A growing security threat
In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked. In his testimony before the …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Most challenging security threats for CTOs
59% of CTOs still see human error as the main security threat to their business, alongside other prominent concerns such as ransomware (49%) and phishing (36%), a research …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Fragmented approach to identity security management creates risk
One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has …
![Active Directory](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/27113502/active_directory2-400x200.jpg)
Active Directory control: How adversaries score even bigger goals via attack paths
Microsoft Active Directory and Azure Active Directory are directory services products used for identity and access management at most major enterprises all over the world. All …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Analyzing and implementing a national zero trust architecture
This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage
With COVID-19 variants on the rise, widespread remote work may be sticking around longer than IT leaders would like, which comes with a heightened risk for cyberattacks that …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Previous employees with access to corporate data remain a threat to businesses
Offboarding employees securely is a key problem for business leaders, with 40% concerned that employees who leave a company retain knowledge of passwords that grant access to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD