Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Set Up Auto-Activation for Users in Jira | miniOrange Automated User Management

This video tutorial walks you through how to configure the automation to Auto-Activate Users in Jira using the miniOrange Automated User Management app. Learn how to automatically restore Atlassian product access for users whose permissions were removed, reducing manual updation. With this feature, you can: Other Products.

How KeeperPAM Integrates With IGA Platforms

Identity Governance and Administration (IGA) plays an important role in determining who should have access to sensitive data and when that access should be granted. While IGA sets the ground rules for privileged access, Privileged Access Management (PAM) focuses on how that access is granted, used and audited. Integrating these two systems is crucial for organizations to achieve enterprise-wide zero-trust security and least-privilege access enforcement.

Think IGA is challenging? You're not alone

If getting visibility into and governance over your identity estate feels like a headache that—despite attempts at treatment—won’t go away, you’re not alone. You may have processes or tools, but manual work persists, and new apps and identities appear every day. Sound familiar? Many identity governance and automation (IGA) programs are stalling, and it’s not for lack of effort.

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace.

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous.

Secrets, out: Why workload identity is essential for AI agent security

AI agents aren’t waiting in the wings anymore. They’re approving payments, spinning up cloud resources, and pulling sensitive data at machine speed. Blink, and a swarm of them has already acted a thousand times before anyone can check the logs. But with all that speed and capability comes risk. For many teams, it’s the authentication model—not the tech—that’s breaking.

Cybersecurity Trends in 2026: From AI Defense to Digital Trust

In 2026, cybersecurity has evolved from being an IT concern to becoming one of the most strategic levers of global stability. As artificial intelligence systems become self-learning, quantum computing moves closer to commercialization, and consumer data flows multiply across platforms, cybersecurity is no longer about preventing attacks-it's about maintaining trust in an increasingly automated world.

47-day TLS certificates: What's changing and how to prepare

Trust is the foundation of the digital world. Every time a customer visits a website, processes a financial transaction, or connects to a business application, that trust is validated by TLS certificates. For years, TLS certificate lifespans stretched comfortably to 13 months or longer, giving teams ample time to track and renew them before they expired and caused an application outage. In some situations, even manual renewals were viable for longer lifespan certificates. That era is ending.

Automated provisioning and governance for healthcare company, B Braun

Join B Braun representatives Andreas Müller, IT project manager, and Michal Kasynski, identity manager engineer as they explore their choice of One Identity Manager for their healthcare and pharmaceutical company’s identity governance and administration (IGA) needs.