identity

The biggest problem with ransomware is not encryption, but credentials
With each passing day, the threat of ransomware increases in frequency, sophistication, and effectiveness. What started as a simple annoyance scheme to collect a ransom has …

The digital identity imperative
The ever-evolving shift to digital means that most of our day-to-day activities are carried out online. We’re now accustomed to simply toggling through a few apps to book a …

Why should enterprises invest in machine identity management tools?
More than 60% of organizations don’t hold full awareness of certificates and keys across their digital assets, according to a research from AppViewX. Over the course of …

Hybrid work: How do you secure every identity on your network?
As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this …

Zero trust network access: A safe journey to a better employee experience
Trust is a foundational element of society. When engaging in any social or commercial interaction, we need to be able to trust the people we deal with. And yet, one of …

Houdini malware returns, enterprise risk assessment compromised by Amazon Sidewalk
Cato Networks announced the results of its analysis of 263 billion enterprise network flows between April and June 2021. Researchers showed a novel use of Houdini malware to …

The evolution of identity-first security
Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN …

What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …

Digital identity verification spend to reach $16.7 billion in 2026
Spending on digital identity verification by businesses will reach $16.7 billion in 2026, from $9.4 billion in 2021, Juniper Research finds. Digital identity verification is …

What is plaguing digital identities?
Auth0 launched a report which highlights key areas of concern for security professionals responsible for managing digital identities, including the exponential rise of …

Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …

Identity management is now mostly about security
IDSA released a study based on an online survey of over 500 IT decision makers. The report examines the impact that the pandemic and increase in remote work had on identity …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility