Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft has announced improved identity and access management protections for AccountGuard users in the United States, ahead of the 2020 elections. [Read More]
Zoom announced that it will offer end-to-end encryption to free users as long as they provide a phone number to verify their account. [Read More]
Apple has announced the availability of a series of open source tools designed to foster collaboration between password manager developers. [Read More]
Google this week announced expansions to the Advanced Protection Program, with the addition of Google Nest and support for more types of security keys for iOS users. [Read More]
Private equity investment company Thoma Bravo announces intention to acquire secure business collaboration solutions provider Exostar, reportedly for $100 million. [Read More]
Encrypted messaging service Signal has announced the introduction of a new feature that allows users to recover their data if they switch to a new device. [Read More]
At this week’s Build virtual event, Microsoft announced new Identity and Azure features meant to improve security for both application developers and enterprise customers. [Read More]
Enterprise identity protection company Semperis raises $40 million in a Series B funding round, which it will use to expand globally. [Read More]
CyberArk has acquired Idaptive, an Identity as a Service (IDaaS) provider, for $70 million in cash. [Read More]
Cloud security company Ermetic emerged from stealth mode with a platform that automates detection and remediation of identity and access-based risks, and $10 million in funding. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Jim Ducharme's picture
Let’s look at some real-world examples of the identity management challenges remote work is creating, and at what it means to rethink identity governance and lifecycle to meet those challenges.
Torsten George's picture
The integration of identity with security is still work in progress, with less than half of businesses having fully implemented key identity-related access controls according to a research study.
Torsten George's picture
Today’s economic climate exacerbates risks of insider threats, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job, make up for income losses, etc.
Torsten George's picture
With IT budgets being cut back in response to the economic contraction caused by the current health crisis, security teams need to deliver more with less.
Torsten George's picture
Static passwords lack the ability to verify whether the user accessing data is authentic or just someone who bought a compromised password.
Jim Ducharme's picture
If there’s one thing you can be sure of about user authentication methods today, it’s that determining the best choice isn’t as simple or straightforward as it used to be.
Josh Lefkowitz's picture
As the technology and tools to leverage stolen credentials advance, defenders should seek out innovative new ways to proactively flag exposed passwords leveraging insights gleaned from illicit communities and open-web dumps.
Jim Ducharme's picture
As the workforce continues to evolve, a one-size-fits-all approach won’t work for different identity and access management needs across organizations.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?