Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why identity security is foundational for crypto agility in the post-quantum era

Cryptographic failures have a knack for turning a quiet weekend into a chaotic, all-hands-on-deck emergency. Consider the SHA-1 to SHA-2 deprecation, sometimes referred to as “Shapocalypse,” which sent teams scrambling to reissue thousands of certificates and exposed how many legacy systems weren’t ready for stronger hash algorithms. The major Certificate Authority (CA) distrust events involving DigiNotar in 2011, Symantec in 2017-18, and Entrust in 2024-25 created similar disruption.

How autonomous AI agents like OpenClaw are reshaping enterprise identity security

The viral surge of OpenClaw (formerly Clawdbot and Moltbot) has captured the tech world’s imagination, amassing over 160,000 GitHub stars and driving a hardware rush for Mac Minis to host these 24/7 assistants.

One Identity Appoints Gihan Munasinghe as Chief Technology Officer

One Identity, a leader in unified identity security, today announced the appointment of Gihan Munasinghe as Chief Technology Officer. Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. In this role, he will lead the engineering organization and set technology strategy, prioritizing innovation that best serves customers as their security, operational, and deployment needs evolve.

7 ways synthetic identity fraud is changing in 2026

Synthetic identity fraud used to be a specialty fraud job. Bad actors created synthetic identities by modifying personal information, combining multiple real identities, or combining real and fake information. But building up identities convincing enough to pass muster took time, research, and effort. As a result, you typically saw synthetic identity fraud when bad actors targeted organizations that could pay off in a significant way.

Contain the SSO blast radius: Identity security beyond MFA

Over the past week, multiple research teams have documented a renewed wave of voice-led social engineering (vishing) targeting identity providers and federated access. The entry point is not through malware or a zero-day exploit. The goal is simple. Persuade a user to help complete authentication in real time, then use that trusted session to move through SaaS applications and exfiltrate data. Security leaders already know the fundamentals. Multi-factor authentication (MFA) can be socially engineered.

User Provisioning and Data Synchronization - User Synchronization for WordPress

With the growth of any business or organization, the importance of data accuracy, consistency, and privacy is rising. Things that may seem like a minor data error or glitch can have a major negative impact on sales, decision-making, and customer retention.

Dinari bridges traditional markets and digital assets - S2E09

In this episode, we're excited to introduce Brandon Ooi, the COO of Dinari, a fintech innovator making compliant tokenized securities accessible to investors. Brandon co-founded Crunchyroll as its CTO and worked at Stripe as an engineer specializing in marketplace enterprises, bringing deep technical expertise and product leadership to the intersection of traditional finance and blockchain technology. Join us as we explore Brandon's journey from building beloved consumer platforms to pioneering the future of securities trading, and how Dinari is bridging the gap between traditional markets and digital assets.
Featured Post

Innovation at Speed: Why Machine Identity Security Is Now a Boardroom Priority

CEOs across the manufacturing sector remain optimistic about the potential of digital transformation to boost productivity, efficiency, and competitiveness. Yes - manufacturers face a double bind - innovate fast (and potentially feel pain) or risk falling behind; but every step forward expands the attack surface. This sits alongside a stark reality: the manufacturing sector now suffers 26% of all cyberattacks, making it one of the most targeted industries globally. However, the most significant emerging threat is not always the one that leaders expect.

AI agents are forcing a reckoning with identity and control

Most organizations never planned for AI to start making real decisions. They started with simple helpers. An agent answered basic questions or generated small automations so teams could avoid opening another IT ticket. It felt harmless. But as these agents become more capable and more autonomous, they begin operating across systems at machine speed. They connect tools, provision access, and trigger chained actions long after the original request.

Identity & Access Management (IAM) Metrics Every CISO Must Track in 2026

Consider a common scenario: Your organization has allocated millions toward firewalls, endpoint protection, and advanced threat detection systems. Your security operations team maintains continuous monitoring through sophisticated dashboards. Yet, despite these comprehensive defenses, an attacker can gain unauthorized access using nothing more than compromised credentials and a hijacked service account. This is where identity and access management metrics play a key role.