Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why traditional IAM tools are now obsolete

What do some of the top breaches in recent history have in common? They were all targeted through identities, despite all having credential-based cybersecurity tools in place. Join Larry Chinksi, SVP of Corporate IAM Strategy at One Identity, for a session on why traditional IAM tools are not enough to protect organizations in today’s ever-evolving identity landscape.

The future of digital identity in enterprises and beyond: EIC 2024 takeaways

Larry Chinski, SVP of Corporate IAM Strategy at One Identity and Martin Kuppinger, Principal Analyst at KuppingerCole, discuss their key takeaways of EIC 2024 in Berlin. Join them as they explore the drivers of growth in the identity management market, current industry trends and where the market is headed.

What Are the Benefits of FedRAMP Certification in 2024?

FedRAMP, the federal risk and authorization management program, is a comprehensive and structured way to develop a security – mostly cybersecurity – position when working with the federal government. It’s a framework meant for contractors and third-party businesses that handle information for the government and who need to keep it secure. The question is, if you’re a cloud service provider, what are the benefits of implementing FedRAMP?

Learn about ISO 27001 Penetration Testing and its requirements

ISO 27001, the internationally recognised standard for information security management systems (ISMS), provides a framework for organisations to protect their valuable information assets. Penetration testing is crucial in preventing data breaches and maintaining the business’s reputation. ISO 27001 strongly recommends it as a critical tool for assessing an organisation’s security posture and ensuring compliance with control A.12.6.1, which focuses on managing technical vulnerabilities.

PCI DSS Penetration Testing Guide

The Payment Card Industry Data Security Standard (PCI DSS) is a global cornerstone for safeguarding cardholder data. PCI DSS version 4.0, the most recent iteration, emphasises a dynamic, risk-based approach to security, compelling organisations to tailor their controls to their unique environments. PCI DSS penetration tests are crucial for meeting and maintaining security standards.

Why Vulnerability Scanning is an Offensive Security Program's Secret Weapon

Knowing what you don’t know is the key to keeping an organization safe and the best method of doing so is with an offensive security approach that includes vulnerability scanning. By being proactive one can identify exploitable weaknesses in your own systems before malicious actors can. Here's why vulnerability scanning is an essential part of any offensive security solution: Vulnerability scanning is just one piece of the offensive security puzzle, but it's a crucial one.

How To Disable Your Browser-Based Password Manager

If you save your passwords in a browser password manager, your passwords may be at risk of becoming compromised. This is because browsers frequently remain logged in, meaning if someone gained access to your device they’d have access to all your stored passwords. Additionally, if your browser were to become compromised, everything stored in your browser would also be at risk of becoming compromised due to weak encryption standards.

What I Did To Secure My Accounts After the Ticketmaster Breach

On May 20, 2024, Ticketmaster parent company Live Nation Entertainment launched an investigation after detecting unauthorized activity within a database containing company data. A week later, they were contacted by someone who threatened to sell their user data on the dark web. I, like many other Ticketmaster customers, became worried about my data, so I took immediate steps to protect myself. Here is what I did.