identity

What 2025 holds for user identity protection

What 2025 holds for user identity protection 2024-11-14 at 06:45 By Help Net Security In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as […]

React to this headline:

Loading spinner

What 2025 holds for user identity protection Read More »

The changing face of identity security

The changing face of identity security 2024-11-12 at 08:03 By Help Net Security It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold of privileged

React to this headline:

Loading spinner

The changing face of identity security Read More »

Apple’s 45-day certificate proposal: A call to action

Apple’s 45-day certificate proposal: A call to action 2024-11-08 at 08:00 By Help Net Security In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. The Apple proposal will likely go up for a

React to this headline:

Loading spinner

Apple’s 45-day certificate proposal: A call to action Read More »

Identity-related data breaches cost more than average incidents

Identity-related data breaches cost more than average incidents 2024-11-06 at 06:01 By Help Net Security Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of those, 66% reported it as a severe event that affected their organization. 44% estimated that the total

React to this headline:

Loading spinner

Identity-related data breaches cost more than average incidents Read More »

Simplifying decentralized identity systems for everyday use

Simplifying decentralized identity systems for everyday use 2024-10-30 at 07:04 By Mirko Zorz In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy, security, and usability in digital identity systems. She emphasizes modern techniques like biometrics and passkeys to replace knowledge-based authentication methods and highlights

React to this headline:

Loading spinner

Simplifying decentralized identity systems for everyday use Read More »

Unlocking the value of AI-powered identity security

Unlocking the value of AI-powered identity security 2024-10-16 at 06:01 By Help Net Security While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​, according to SailPoint. Identity security adoption still in early stages The value of identity

React to this headline:

Loading spinner

Unlocking the value of AI-powered identity security Read More »

The role of self-sovereign identity in enterprises

The role of self-sovereign identity in enterprises 2024-10-08 at 07:31 By Help Net Security As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, traditional identity systems used by enterprises often expose sensitive information to unnecessary risk, leaving both users and

React to this headline:

Loading spinner

The role of self-sovereign identity in enterprises Read More »

Securing non-human identities: Why fragmented strategies fail

Securing non-human identities: Why fragmented strategies fail 2024-09-25 at 07:31 By Mirko Zorz In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human identities by 20 to 1, organizations are struggling to secure these digital entities

React to this headline:

Loading spinner

Securing non-human identities: Why fragmented strategies fail Read More »

Organizations are making email more secure, and it’s paying off

Organizations are making email more secure, and it’s paying off 2024-09-25 at 06:01 By Help Net Security Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and techniques identified in the 2024 report remain consistent with

React to this headline:

Loading spinner

Organizations are making email more secure, and it’s paying off Read More »

Rising identity security risks: Why organizations must act now

Rising identity security risks: Why organizations must act now 2024-09-20 at 07:01 By Help Net Security As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are struggling with frequent breaches and inadequate security measures, particularly concerning machine identities. Despite increased efforts and awareness,

React to this headline:

Loading spinner

Rising identity security risks: Why organizations must act now Read More »

Hydden Raises $4.4M in Seed Funding for Identity Security Platform

Hydden Raises $4.4M in Seed Funding for Identity Security Platform 2024-09-17 at 16:25 By Eduard Kovacs Hydden has raised $4.4 million in seed funding for a solution designed to provide deep visibility into identities, accounts and privileges. The post Hydden Raises $4.4M in Seed Funding for Identity Security Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Hydden Raises $4.4M in Seed Funding for Identity Security Platform Read More »

Gateways to havoc: Overprivileged dormant service accounts

Gateways to havoc: Overprivileged dormant service accounts 2024-09-17 at 07:32 By Help Net Security Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and applications like websites, APIs, and databases – and facilitate integrations, operating as a proxy to humans and supporting business processes.

React to this headline:

Loading spinner

Gateways to havoc: Overprivileged dormant service accounts Read More »

Organizations still don’t know how to handle non-human identities

Organizations still don’t know how to handle non-human identities 2024-09-13 at 07:01 By Help Net Security Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each NHI can potentially access sensitive data and

React to this headline:

Loading spinner

Organizations still don’t know how to handle non-human identities Read More »

Non-Human IAM Provider Aembit Raises $25 Million

Non-Human IAM Provider Aembit Raises $25 Million 2024-09-12 at 16:46 By Ionut Arghire Aembit has raised $25 million in Series A funding to protect non-human identities and minimize attack surface. The post Non-Human IAM Provider Aembit Raises $25 Million appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Non-Human IAM Provider Aembit Raises $25 Million Read More »

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients 2024-08-19 at 18:46 By Ionut Arghire Data includes names, dates of birth, physical addresses, Social Security Numbers, medical and diagnosis information, and health insurance details. The post Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients appeared first on SecurityWeek.

React to this headline:

Loading spinner

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients Read More »

Microsoft Announces Mandatory MFA for Azure

Microsoft Announces Mandatory MFA for Azure 2024-08-19 at 16:46 By Ionut Arghire Microsoft is implementing automatic enforcement of multi-factor authentication (MFA) for all Azure users starting October. The post Microsoft Announces Mandatory MFA for Azure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Microsoft Announces Mandatory MFA for Azure Read More »

How CISOs enable ITDR approach through the principle of least privilege

How CISOs enable ITDR approach through the principle of least privilege 2024-07-25 at 07:31 By Help Net Security Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than

React to this headline:

Loading spinner

How CISOs enable ITDR approach through the principle of least privilege Read More »

Linx Security Raises $33M to Tackle Digital Identity Threats

Linx Security Raises $33M to Tackle Digital Identity Threats 2024-07-22 at 21:16 By Ryan Naraine New York startup with roots in Israel banks a hefty $33 million early stage funding round. The post Linx Security Raises $33M to Tackle Digital Identity Threats appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Linx Security Raises $33M to Tackle Digital Identity Threats Read More »

Fighting AI-powered synthetic ID fraud with AI

Fighting AI-powered synthetic ID fraud with AI 2024-07-18 at 07:31 By Help Net Security Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. For security professionals, the challenge lies in staying one step ahead of these evolving threats.

React to this headline:

Loading spinner

Fighting AI-powered synthetic ID fraud with AI Read More »

Risk related to non-human identities: Believe the hype, reject the FUD

Risk related to non-human identities: Believe the hype, reject the FUD 2024-07-15 at 08:01 By Help Net Security The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and API keys – has recently skyrocketed. A steady stream of NHI-related breaches is causing some of

React to this headline:

Loading spinner

Risk related to non-human identities: Believe the hype, reject the FUD Read More »

Scroll to Top