identity management
![privacy](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28143248/privacy1-400x200.jpg)
Risk related to non-human identities: Believe the hype, reject the FUD
The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18152717/eyes-400x200.webp)
Machine identities lack essential security controls, pose major threat
Siloed approaches to securing human and machine identities are driving identity-based attacks across enterprises and their ecosystems, according to CyberArk. The CyberArk 2024 …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16165304/biometrics-1400-400x200.jpg)
Who owns customer identity?
When I’m talking with prospective clients, I like to ask: which department owns customer identity? Everyone immediately looks towards a different team. While every team …
![Charlotte Wylie](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03113824/charlotte_wylie-2-okta-400x200.webp)
Strategies for secure identity management in hybrid environments
In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. She …
![OT](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/26145325/ot-ics-industry-1400-400x200.jpg)
How can the energy sector bolster its resilience to ransomware attacks?
Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this …
![digital identity](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/20132920/digital_identity1-400x200.jpg)
How much does cloud-based identity expand your attack surface?
We all know using a cloud-based identity provider (IdP) expands your attack surface, but just how big does that attack surface get? And can we even know for sure? As Michael …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16113038/strategy-1400-2-400x200.jpg)
8 cybersecurity predictions shaping the future of cyber defense
Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of …
![Deepak Taneja](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23131847/deepak_taneja-2-zilla_security-400x200.jpg)
How organizations can navigate identity security risks in 2024
Managing IAM challenges in hybrid IT environments requires a holistic approach, integrating solutions and automating processes to ensure effective access controls and …
![Patrick Harding](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15142120/patrick_harding-2-ping_identity-1-400x200.jpg)
How decentralized identity is shaping the future of data protection
In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in …
![Marco Eggerling](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16122954/marco_eggerling-2-check_point-400x200.jpg)
How CISOs navigate policies and access across enterprises
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and …
![Jean-Philippe Aumasson](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17140145/jean_philippe_aumasson-2-taurus-400x200.jpg)
Beyond blockchain: Strategies for seamless digital asset integration
In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …
![Chris Mixter](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/05115249/chris_mixter-2-gartner-400x200.jpg)
CISOs’ crucial role in aligning security goals with enterprise expectations
In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders