newsTelesign launches integrated API to combine traditional identity verification channels Verify API will let customers choose any of the seven verification channels to silently verify all end-users.By Shweta Sharma27 Mar 20243 minsAuthenticationIdentity and Access ManagementSecurity Software feature Redefining multifactor authentication: Why we need passkeysBy Joe Stocker15 Mar 20248 minsMulti-factor AuthenticationAuthenticationIdentity and Access Managementfeature How to strengthen your Kubernetes defensesBy David Strom13 Feb 20248 minsDevSecOpsApplication SecurityIdentity and Access Management newsCisco’s identity and access security offerings to receive AI upgradesBy Shweta Sharma 06 Feb 20243 minsIdentity and Access Management featureProtecting Windows networks: Get back to basics for the new yearBy Susan Bradley 09 Jan 20246 minsPasswordsWindows SecurityIdentity and Access Management newsAmazon debuts biometric security device, updates Detective and GuardDutyBy Jon Gold 29 Nov 20233 minsBiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management featureThe alarming rise of quishing is a red flag for CISOsBy Matthew Tyson 21 Nov 20238 minsPhishingIdentity and Access ManagementSecurity Practices opinionThe SSO tax is killing trust in the security industryBy Joe Sullivan and Atul Tulshiibagwale 21 Nov 202310 minsAuthenticationSingle Sign-onIdentity and Access Management featureAs perimeter defenses fall, the identify-first approach steps into the breachBy Mary Pratt 14 Nov 20239 minsCSO and CISOZero TrustIdentity and Access Management ArticlesfeatureKeep it secret, keep it safe: the essential role of cybersecurity in document managementUntold quantities of sensitive data reside in the huge variety of documents that accumulate over the lifetime of an organization. Keeping them safe no matter where they’re stored should be a top priority.By Linda Rosencrance 08 Nov 2023 8 minsCSO and CISOCloud SecurityData and Information SecuritynewsFacebook tops security ratings among social networksEnterprise-grade authentication remains an Achilles heel of the social media world, but security is improving in other areas, according to a report by access management provider Cerby.By Jon Gold 07 Nov 2023 3 minsInternet SecurityIdentity and Access ManagementPrivacynewsFrontegg releases new identity, user management solution for SaaS productsFrontegg Forward delivers four fundamental user identity management innovations for SaaS vendors.By Michael Hill 07 Nov 2023 4 minsAuthenticationAccess ControlIdentity Management SolutionsnewsTeleport’s new offering to help reduce attack response timesThe identity governance and security offering will automate access requests, detect weak access patterns, and help with incident response.By Shweta Sharma 26 Oct 2023 3 minsIdentity and Access ManagementnewsOkta support system breach highlights need for strong MFA policiesBreach was detected and blocked before it granted access to attackers due to the enforcement of multifactor authentication.By Lucian Constantin 23 Oct 2023 4 minsMulti-factor AuthenticationData BreachIdentity and Access ManagementnewsMost organizations globally have implemented zero trustZero-trust adoption is growing according to a recent report from Okta that found 61% of organizations have already implemented a zero-trust initiative.By Samira Sarraf 18 Oct 2023 4 minsAuthenticationZero TrustIdentity and Access ManagementfeatureOnly you can prevent forest trust issues: managing the complexity of merged networksWhen two companies merge, a top-to-bottom assessment of settings for Active Directory forests with trusts can eliminate headaches and create a more secure environmentBy Susan Bradley 11 Oct 2023 7 minsActive DirectoryMergers and AcquisitionsData and Information SecuritynewsVeza releases new IGA solution to enhance identity securityThe solution manages access authorization based on roles and permissions, not users or groups.By Michael Hill 10 Oct 2023 4 minsAuthenticationAccess ControlIdentity and Access ManagementfeatureWhat is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management?By Matthew Tyson 26 Sep 2023 12 minsCryptocurrencyAuthenticationIdentity Management SolutionsnewsIAM, cloud security to drive new cybersecurity spendingCISOs also say they want better third-party risk management, AI security, and human error/insider risk reduction solutions.By Michael Hill 07 Sep 2023 4 minsCSO and CISOGenerative AICloud SecurityfeatureWhy Instagram Threads is a hotbed of risks for businessesThreads is already a target for fraud and abuse, with several potential security and compliance risks associated with its use for organizations.By Michael Hill 04 Sep 2023 8 minsPhishingHackingSocial EngineeringnewsIdentity-based security threats are growing rapidly: reportCybercriminals are increasingly using compromise methods that grant “legitimate” access to target systems, making them harder to detect.By Jon Gold 08 Aug 2023 3 minsEndpoint ProtectionIdentity and Access Management Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence