Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity

Featured Post

The Coming Quantum Computing Storm: How can Identity best prepare?

During the last 20 years many areas of technology development seemed to speed up dramatically. Identity management as part of cybersecurity, has undergone an incredible transformation, at a rate which no one could have predicted. But few areas moved as fast as quantum computing is developing today. The speed of progress is impressive with advances in capability, which once seemed near impossible, being achieved in relatively short time frames.

Why cyber insurance should be part of any comprehensive risk management strategy

The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of the most robust ways to meet those requirements is with multi-factor authentication (MFA).

Securing Privileged Access in a Remote Work World: Challenges and Best Practices

In today's disconnected world, the task of managing privileged access has become increasingly challenging. The surge in remote work has exposed employees to new vulnerabilities as they access sensitive systems and data from unsecured networks and personal devices, making them attractive targets for cyberattacks. To combat these risks, organizations must adopt Privileged Access Management (PAM) solutions.

ChatGPT and Identity Security: Breaking down the identity security risks of AI

It is fair to say that few technologies have grabbed more news headlines in 2023 than ChatGPT. As an artificial intelligence (AI) language model, ChatGPT is a powerful tool that has the potential to revolutionize multiple business areas, including, but not limited to, marketing, operations, engineering, risk management, legal and employee optimization.

Making Zero Trust a Reality

Zero Trust has been a concept since 2009 when Forrester first realized that traditional security models operated on the outdated assumption that everything inside an organization’s network should be trusted. 14 years later, the rule of “Never Trust, Always Verify” has never been more important, especially as data breaches continue to make headlines on a seemingly daily basis.

How to manage SAP user accounts and access rights with Identity Manager

Does your company run SAP applications? If you do, you know how difficult it can be to manage identities. Most of the time, SAP applications are siloed and run completely independently of the rest your IT environment. This makes provisioning users across your SAP and non-SAP platforms a challenge at minimum and at worst, an impossible task. One Identity Manager provides comprehensive certified integration with SAP products.

Why IAM maturity is key to accessible cyber insurance

Cyber insurance is an increasingly critical part of an organization's approach to cyber defense and CISOs have realized that identity management and, in particular, Privileged Access Management (PAM) are some of the most important and influential aspects of any organization’s overall cybersecurity strategy.