Topic: access management
-
Imprivata Boosts NHS Security with Passwordless Access
Imprivata has upgraded its security platform to help UK healthcare providers meet complex regulations like the DSPT and Care Identity Service, focusing on passwordless authentication and identity management to streamline workflows and enhance cybersecurity. The enhanced Enterprise Access Manageme...
Read More » -
Master NIS2 Compliance: Secure Passwords & MFA
The NIS2 Directive is a critical EU regulation requiring medium and large organizations in key sectors to implement stringent security controls, with a major focus on robust identity and access management to combat credential-based attacks. Compliance is mandatory for qualifying organizations, an...
Read More » -
Entro Security: Governance for Enterprise AI Agents & Access
Entro Security has launched "Agentic Governance & Administration (AGA)", a new platform component designed to manage AI agents' access and governance in corporate IT environments, addressing challenges like inventory, least privilege, and auditability. The system extends traditional identity go...
Read More » -
A Step-by-Step Guide to Implementing Zero Trust
Zero trust security shifts from assuming internal network trust to continuously verifying every user, device, and application attempting to access resources, starting with foundational actions like enforcing multi-factor authentication (MFA) and removing stale accounts. The model adds intelligent...
Read More » -
SaaS Security: A New Framework for Essential Controls
Modern enterprises face significant challenges securing their diverse SaaS portfolios due to fragmented security settings and inadequate traditional vendor assessments. The Cloud Security Alliance introduced the SaaS Security Capability Framework (SSCF) to standardize security controls, enabling ...
Read More » -
Druva Restores Access by Linking Identity Data to User Behavior
Identity-driven attacks are a major security threat, and Druva's new Identity Resilience solution provides a unified SaaS platform to protect, detect, and recover from identity compromises across providers like Okta and Microsoft. The platform uses an identity-aware methodology, modeling identiti...
Read More » -
iProov: Secure Logins by Verifying the Human Behind Every Account
The digital security landscape faces a critical gap, as traditional systems verify credentials and devices but often fail to confirm the actual human user, leaving organizations vulnerable to AI-driven impersonation and identity-based threats. High-profile incidents, such as a $25 million loss fr...
Read More » -
Zero Trust: Why It's a Journey, Not a Destination
Zero trust is a continuous process, not a one-time project, requiring ongoing adaptation due to evolving threats, changing technology, and organizational growth. Modern challenges like AI-powered attacks, supply chain vulnerabilities, and distributed infrastructure (cloud, IoT, microservices) com...
Read More » -
Cloudflare Balances Data Security with AI Access
Cloudflare One has been enhanced to help businesses securely integrate and manage generative AI tools while maintaining data protection and compliance standards. New features include AI Security Posture Management (AI-SPM), offering discovery of AI usage patterns, protection against unapproved AI...
Read More » -
Hiring Now: Top Cybersecurity Jobs in November 2025
The global demand for skilled cybersecurity professionals is rising, with November 2025 offering diverse roles across specializations like application security, cloud infrastructure, and governance to address evolving digital threats. Positions span various countries and work arrangements, includ...
Read More » -
The Hidden Dangers of Unmanaged Identities
Unmanaged identities, including both human and machine accounts outside formal oversight, create critical security vulnerabilities by expanding the attack surface and undermining compliance and operational stability. These identities pose distinct risks such as excessive administrator permissions...
Read More »