Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Apono - Okta Integration: Requesting temporary access to Okta groups

ICYMI: In the last video demo of @Okta + Apono, we showed you how to integrate your Okta resources with Apono through SCIM. (It’s super simple!) Once the integration is done, Okta users or group members can easily request temporary access to different cloud resources using our just-in-time capability. That includes temporary access to Okta group membership If you're managing your developer-on-duty, customer data access, or any other use case with Okta groups, you don’t want to miss out on this one.

Securing tomorrow: A roadmap to holistic identity security success

iC Consult, a trusted partner of One Identity, is the world's leading independent consultancy, systems integrator, and managed services provider for IAM. In this video, Andre Priebe, Chief Technology Officer at iC Consult, explores the biggest security concerns facing iC Consult customers today, best practices when embarking on an IAM journey, the importance of implementing a holistic IAM approach and One Identity’s key role in IAM success.

Privilege Escalation and Identity in the Age of AI: Leveraging PAM for Enhanced Security

The intersection of privilege escalation and identity is taking on new dimensions with the advent of Artificial Intelligence (AI). As AI becomes increasingly integrated into our lives, it both challenges and reinforces existing notions of privilege and identity. In this blog, we'll explore what privilege escalation means in the context of AI and how it influences our understanding of personal and societal identities.

Save the Embarrassment: The Value of Multi-Factor Authentication

These days, it’s not a matter of if your password will be breached but when. Major websites experience massive data breaches at an alarming rate. Have I Been Pwned currently has records from 705 sites comprising 12.6 billion accounts. This includes well-known names like Wattpad, Verifications.io, and Facebook.

Industry Trends and the Importance of Unified Identity Security

Enterprise attack surfaces continue to evolve through cloud-based infrastructure, the proliferation of connected devices, and reliance on third-party solutions. New vulnerabilities are emerging every day from security gaps in the software supply chain to use of AI and cybercriminals are being proactive in exploiting them. Comprehensive Identity Security is a critical element to containing these new risks but maintaining best practices for a robust IAM strategy using multiple security tools has never been more challenging. This session will address how to reduce human error, avoid gaps and overlaps of your different IAM tools, and bring your security strategy in-line with the challenges of today and tomorrow's cyber threats.