Identity and access management products



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : Identity and access management products
-
January 20, 2021
20
Jan'21
Should I be worried about MFA-bypassing pass-the-cookie attacks?
Malicious actors bypassed multi-factor authentication using so-called pass-the-cookie attacks, but how worrying is this and what is the risk to organisations?
-
January 20, 2021
20
Jan'21
Malwarebytes also hit by SolarWinds attackers
The nation state group that attacked SolarWinds in December got inside Malwarebytes by exploiting privileged access to its Microsoft Office 365 tenant, the firm reveals
-
January 19, 2021
19
Jan'21
MAS offers guidance on mitigating supply chain threats
Monetary Authority of Singapore revises its technology risk management guidelines to help the financial sector guard against supply chain attacks
-
January 18, 2021
18
Jan'21
Australians lost A$176m to scams in 2020
Investment scams topped the list of scams, which grew by 23.1% in 2020 as criminals exploited human psychology using social engineering
In Depth : Identity and access management products
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure the correct one is chosen Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
Blog Posts : Identity and access management products
-
Throwback Thursday: the authentication arms race continues
As our contribution to the bit of fun that is Throwback Thursday, we're taking a weekly stroll in the Freeform Dynamics archives. This week we are heading back to 2006, when we reported on that ... Continue Reading
-
What next for digital identity in the UK? Industry welcomes latest DCMS plan
After months – some would say years – of frustration and delay, tech suppliers have largely welcomed the latest government initiative to establish a digital identity ecosystem in the UK. The ... Continue Reading
-
Even GDS is telling GDS to shut down Verify
The ailing Gov.uk Verify digital identity system was given a Frankenstein’s monster-like burst of energy back in April, when the lockdown-induced surge in Universal Credit applications brought ... Continue Reading
Opinion : Identity and access management products
-
Security Think Tank: In 2021, enable, empower and entrust your users
After a year of unprecedented disruption thanks to Covid-19, it looks like remote working is set to remain with us for now, which means security strategies will change in 2021. What will this change look like, and what tools and services will be selling like hot cakes? Continue Reading
-
Security Think Tank: Cyber effectiveness, efficiency key in 2021
After a year of unprecedented disruption thanks to Covid-19, it looks like remote working is set to remain with us for now, which means security strategies will change in 2021. What will this change look like, and what tools and services will be selling like hot cakes? Continue Reading
-
How to manage non-human identities
Identity management has traditionally focused on human identities, but non-human identities are proliferating and must not be overlooked. Businesses can reduce risk by managing both types of identity in the same way using a services-based approach Continue Reading
Videos : Identity and access management products
-
Video: Lauri Love – why we need volunteers to fight malware
Lauri Love talks to Computer Weekly about plans to collaborate with others to tackle malware and use cryptocurrencies to create new ways for businesses to work
-
CW500 video: Security and IoT
What can businesses do to ensure their IAM and security systems are able to support internet connected things
-
CW500 video: Douwe Mik, EY, on security and the IoT
What can businesses do to ensure their IAM and security systems are able to support internet connected things