identity

The role of self-sovereign identity in enterprises

The role of self-sovereign identity in enterprises 2024-10-08 at 07:31 By Help Net Security As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, traditional identity systems used by enterprises often expose sensitive information to unnecessary risk, leaving both users and […]

React to this headline:

Loading spinner

The role of self-sovereign identity in enterprises Read More »

Securing non-human identities: Why fragmented strategies fail

Securing non-human identities: Why fragmented strategies fail 2024-09-25 at 07:31 By Mirko Zorz In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human identities by 20 to 1, organizations are struggling to secure these digital entities

React to this headline:

Loading spinner

Securing non-human identities: Why fragmented strategies fail Read More »

Organizations are making email more secure, and it’s paying off

Organizations are making email more secure, and it’s paying off 2024-09-25 at 06:01 By Help Net Security Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and techniques identified in the 2024 report remain consistent with

React to this headline:

Loading spinner

Organizations are making email more secure, and it’s paying off Read More »

Rising identity security risks: Why organizations must act now

Rising identity security risks: Why organizations must act now 2024-09-20 at 07:01 By Help Net Security As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are struggling with frequent breaches and inadequate security measures, particularly concerning machine identities. Despite increased efforts and awareness,

React to this headline:

Loading spinner

Rising identity security risks: Why organizations must act now Read More »

Hydden Raises $4.4M in Seed Funding for Identity Security Platform

Hydden Raises $4.4M in Seed Funding for Identity Security Platform 2024-09-17 at 16:25 By Eduard Kovacs Hydden has raised $4.4 million in seed funding for a solution designed to provide deep visibility into identities, accounts and privileges. The post Hydden Raises $4.4M in Seed Funding for Identity Security Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Hydden Raises $4.4M in Seed Funding for Identity Security Platform Read More »

Gateways to havoc: Overprivileged dormant service accounts

Gateways to havoc: Overprivileged dormant service accounts 2024-09-17 at 07:32 By Help Net Security Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and applications like websites, APIs, and databases – and facilitate integrations, operating as a proxy to humans and supporting business processes.

React to this headline:

Loading spinner

Gateways to havoc: Overprivileged dormant service accounts Read More »

Organizations still don’t know how to handle non-human identities

Organizations still don’t know how to handle non-human identities 2024-09-13 at 07:01 By Help Net Security Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each NHI can potentially access sensitive data and

React to this headline:

Loading spinner

Organizations still don’t know how to handle non-human identities Read More »

Non-Human IAM Provider Aembit Raises $25 Million

Non-Human IAM Provider Aembit Raises $25 Million 2024-09-12 at 16:46 By Ionut Arghire Aembit has raised $25 million in Series A funding to protect non-human identities and minimize attack surface. The post Non-Human IAM Provider Aembit Raises $25 Million appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Non-Human IAM Provider Aembit Raises $25 Million Read More »

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients 2024-08-19 at 18:46 By Ionut Arghire Data includes names, dates of birth, physical addresses, Social Security Numbers, medical and diagnosis information, and health insurance details. The post Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients appeared first on SecurityWeek.

React to this headline:

Loading spinner

Carespring Data Breach Exposes Personal and Medical Information of Nearly 77,000 Patients Read More »

Microsoft Announces Mandatory MFA for Azure

Microsoft Announces Mandatory MFA for Azure 2024-08-19 at 16:46 By Ionut Arghire Microsoft is implementing automatic enforcement of multi-factor authentication (MFA) for all Azure users starting October. The post Microsoft Announces Mandatory MFA for Azure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Microsoft Announces Mandatory MFA for Azure Read More »

How CISOs enable ITDR approach through the principle of least privilege

How CISOs enable ITDR approach through the principle of least privilege 2024-07-25 at 07:31 By Help Net Security Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than

React to this headline:

Loading spinner

How CISOs enable ITDR approach through the principle of least privilege Read More »

Linx Security Raises $33M to Tackle Digital Identity Threats

Linx Security Raises $33M to Tackle Digital Identity Threats 2024-07-22 at 21:16 By Ryan Naraine New York startup with roots in Israel banks a hefty $33 million early stage funding round. The post Linx Security Raises $33M to Tackle Digital Identity Threats appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Linx Security Raises $33M to Tackle Digital Identity Threats Read More »

Fighting AI-powered synthetic ID fraud with AI

Fighting AI-powered synthetic ID fraud with AI 2024-07-18 at 07:31 By Help Net Security Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. For security professionals, the challenge lies in staying one step ahead of these evolving threats.

React to this headline:

Loading spinner

Fighting AI-powered synthetic ID fraud with AI Read More »

Risk related to non-human identities: Believe the hype, reject the FUD

Risk related to non-human identities: Believe the hype, reject the FUD 2024-07-15 at 08:01 By Help Net Security The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and API keys – has recently skyrocketed. A steady stream of NHI-related breaches is causing some of

React to this headline:

Loading spinner

Risk related to non-human identities: Believe the hype, reject the FUD Read More »

Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

Product showcase: Protect digital identities with Swissbit’s iShield Key Pro 2024-07-01 at 07:01 By Help Net Security In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. Let’s delve into how the iShield

React to this headline:

Loading spinner

Product showcase: Protect digital identities with Swissbit’s iShield Key Pro Read More »

AuthZed Raises $12 Million for Permissions Management Technology

AuthZed Raises $12 Million for Permissions Management Technology 2024-06-28 at 17:46 By Ionut Arghire Permissions management technology startup AuthZed has raised $12 million in a Series A funding round led by General Catalyst. The post AuthZed Raises $12 Million for Permissions Management Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

AuthZed Raises $12 Million for Permissions Management Technology Read More »

Semperis Eyes IPO With $125 Million in Growth Financing

Semperis Eyes IPO With $125 Million in Growth Financing 2024-06-20 at 15:31 By Ryan Naraine Enterprise identity company raises new capital from JP Morgan and Hercules Capital as it prepares for an IPO exit. The post Semperis Eyes IPO With $125 Million in Growth Financing appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Semperis Eyes IPO With $125 Million in Growth Financing Read More »

Preparing for a post-quantum future

Preparing for a post-quantum future 2024-06-18 at 06:31 By Help Net Security Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net Security video, Kevin

React to this headline:

Loading spinner

Preparing for a post-quantum future Read More »

Protecting identity in a world of deepfakes and social engineering

Protecting identity in a world of deepfakes and social engineering 2024-06-10 at 06:01 By Help Net Security In this Help Net Security video round-up, security experts discuss various aspects of identity verification and security, including generative AI’s impact, the state of identity fraud prevention, and the potential impact of identity challenges on the security sector.

React to this headline:

Loading spinner

Protecting identity in a world of deepfakes and social engineering Read More »

How AI-powered attacks are accelerating the shift to zero trust strategies

How AI-powered attacks are accelerating the shift to zero trust strategies 2024-06-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats. Markey discusses the impact of emerging threats like AI-generated

React to this headline:

Loading spinner

How AI-powered attacks are accelerating the shift to zero trust strategies Read More »

Scroll to Top