Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 ways IAM helps with cybersecurity

Identity and Access Management (IAM) is a cybersecurity discipline, so it’s almost trivial to claim that a solid IAM foundation brings critical security benefits for any organization. Fundamentally, IAM allows the right people to access the right resources at the right times, in the right way for the right reasons. Yet IAM projects consistently take a backseat to other, more fashionable cybersecurity initiatives in a lot of organizations, ultimately harming the security posture.

Taming the many-headed monster of data privacy law

If you think data privacy law is a minefield, you’re not alone. At our last count, there were 120 jurisdictions around the globe, each with their own data privacy legislation. Each set of legislation is as complex and intricate as the next. How are you supposed to tame this multi-headed monster? How on earth did we end up here? Let’s look at the current state of global data protection legislation, where it’s headed and what you can do about it.

The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these efforts, breaches continue to occur, often through new or unorthodox attack vectors that bypass traditional perimeter defenses.

Data breach vigilantes: CIAM and IGA for customer data protection

In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compromises. Yet, beneath the surface, a silent war is waged against the very essence of our online identities. Each breach is a battle fought on the front lines of cybersecurity.

Identity risk management: What is it and how can you achieve it?

Risk. It’s more than just an infuriating board game from your childhood. And when identity risk is involved in your cybersecurity landscape – and it will be involved, since identity is one of the most easily accessible and most frequently attacked facets of your IT environment – the potential consequences of its compromise extend well beyond losing control of a fantasy continent on a game board.

Strengthening security against cyber threats: Unveiling One Identity Cloud PAM Essentials

In a rapidly evolving cybersecurity landscape, organizations across all industries and sizes face an ever-growing array of sophisticated threats. Privileged accounts, in particular, have become prime targets for hackers, with nearly every major breach in recent years involving unauthorized access. Breaches caused by phishing and compromised credentials (the most common type of attack) cost an average of $4.76M and take almost 11 months to resolve.

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.

Unified Identity - look for the meaning behind the hype!

If you've listened to software vendors in the identity space lately, you will have noticed that "unified" has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits! However (there is always a however, right?) not every "unified" "identity" "security" "platform" is made equal.

SAP GRC (Governance, Risk Management and Compliance) Framework and Identity Manager

The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, they can minimize the time and cost of compliance with internal and external regulations. The SAP GRC framework comprises the SAP Access Control and SAP Cloud Identity Access Governance solutions.