Topic: identity management

  • OpenID Foundation's Plan to Tame Dangerous AI Agents

    OpenID Foundation's Plan to Tame Dangerous AI Agents

    The rapid adoption of AI agents introduces significant security vulnerabilities, as they can bypass traditional digital security barriers, necessitating new, open identity and access management standards to prevent unauthorized access to sensitive data and processes. AI agents, enabled by technol...

    Read More »
  • Okta's Identity Security Fabric: Securing the AI-Driven Enterprise

    Okta's Identity Security Fabric: Securing the AI-Driven Enterprise

    Securing AI systems is a critical enterprise priority, with Okta introducing an identity security fabric to manage non-human identities and combat AI-driven fraud through tamper-proof credentials. A significant security gap exists as rapid AI adoption has outpaced governance, leaving organization...

    Read More »
  • Future-Proof Cybersecurity: What Actually Works

    Future-Proof Cybersecurity: What Actually Works

    Future-proofing cybersecurity requires strategic focus on core principles like reducing exposure, strengthening identity controls, and leveraging AI responsibly, rather than just adopting the latest tools. Visibility is foundational; organizations must maintain real-time awareness of assets, data...

    Read More »
  • Master Zero Trust & Identity at Today's Virtual Summit

    Master Zero Trust & Identity at Today's Virtual Summit

    The SecurityWeek Zero Trust & Identity Strategies Summit 2025 is a virtual event focusing on modern cybersecurity frameworks and the evolution of Zero Trust into a core strategy for protecting corporate assets. Zero Trust Network Access (ZTNA) is highlighted as essential for strengthening access ...

    Read More »
  • Microsoft's Entra ID Flaws: A Near-Catastrophic Security Risk

    Microsoft's Entra ID Flaws: A Near-Catastrophic Security Risk

    Security researcher Dirk-jan Mollema discovered two severe vulnerabilities in Microsoft’s Entra ID that could have allowed attackers to gain global administrator privileges across nearly all Azure customer environments. The flaws enabled an attacker to impersonate any user in any tenant, potentia...

    Read More »
  • Unified Runtime Platforms: The Future of Posture & Prioritization

    Unified Runtime Platforms: The Future of Posture & Prioritization

    The future of cloud security emphasizes unified runtime platforms that prioritize real-time risk reduction over tool management, enabling CISOs to focus on actionable insights rather than theoretical threats. Transitioning to runtime-first approaches should be framed as strategic enhancements, st...

    Read More »
  • Top Infosec Products Launched This Week: July 2025

    Top Infosec Products Launched This Week: July 2025

    The cybersecurity landscape is evolving with new solutions like Cynomi's enhanced platform for business impact analysis and continuity planning, enabling proactive security measures. Tosibox launched TosiANTA, a native anomaly detection module for OT networks, offering quick deployment and improv...

    Read More »
  • #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    Endpoint security is crucial as cyber threats target corporate devices, IoT, and supply chains, with gaps in protection leaving enterprises vulnerable. Identity breaches and compromised credentials are major attack vectors, exacerbated by poor patch management and BYOD policies. Modern EDR tools ...

    Read More »
  • Europe's Push for Digital Sovereignty: Reclaiming the Stack

    Europe's Push for Digital Sovereignty: Reclaiming the Stack

    Europe is prioritizing digital sovereignty to reduce reliance on foreign tech giants and mitigate strategic risks associated with external control over critical infrastructure. Actions include adopting sovereign cloud platforms, open-source software, and local alternatives to decrease dependencie...

    Read More »
  • The Hidden Toll of CDP Features: Marketers' Imposter Syndrome

    The Hidden Toll of CDP Features: Marketers' Imposter Syndrome

    Marketing teams often build data foundations only to see them become outdated by new technologies, leading to disrupted workflows and diminished confidence. The rapid evolution of marketing technology creates a gap where foundational tasks like data quality and governance are complex yet underval...

    Read More »
  • Forrester: AI-Powered Data Breach Coming in 2026

    Forrester: AI-Powered Data Breach Coming in 2026

    Forrester predicts a major data breach caused by autonomous AI systems will occur and become public next year, leading to employee terminations and highlighting corporate vulnerabilities. Generative AI tools have already been linked to security incidents, and without proper safeguards, autonomous...

    Read More »
  • The Future is Passkeys: Say Goodbye to Passwords

    The Future is Passkeys: Say Goodbye to Passwords

    Passkeys are emerging as a more secure and user-friendly alternative to traditional passwords, simplifying access to online services while enhancing security. A hybrid environment of passwords and passkeys is expected to persist for years as businesses gradually update systems, with consumer adop...

    Read More »
  • Top 6 Cyber Security Trends Every CISO Must Know in 2025

    Top 6 Cyber Security Trends Every CISO Must Know in 2025

    The cybersecurity landscape is evolving rapidly, with experts at Infosecurity Europe 2025 stressing the need for foundational security practices like human behavior and identity management alongside innovation. Phone-based social engineering attacks are rising, with deepfake technology making voi...

    Read More »
  • PwC: AI Leads Cybersecurity Spending as Top Priority

    PwC: AI Leads Cybersecurity Spending as Top Priority

    Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...

    Read More »
  • FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access unifies four security protections into a single cloud-managed platform, offering enterprise-level Zero Trust security accessible to managed service providers and smaller IT teams through WatchGuard Cloud. It replaces traditional VPNs with identity-based access controls, pro...

    Read More »
  • Rubrik & Okta Unite to Stop Ransomware with Identity Recovery

    Rubrik & Okta Unite to Stop Ransomware with Identity Recovery

    Rubrik and Okta have partnered to launch Rubrik Okta Recovery, offering automated, immutable backups and granular restoration for Okta Identity Provider environments to combat ransomware and ensure swift recovery. This solution provides operational resilience by protecting Okta tenants from accid...

    Read More »
  • Top Cybersecurity Jobs Hiring in September 2025

    Top Cybersecurity Jobs Hiring in September 2025

    The cybersecurity field is experiencing high demand for professionals in September 2025, with global opportunities available in various roles and work arrangements, including remote positions. Key roles being recruited for include Application Security Engineers, CISOs, Cloud Security Architects, ...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs in September 2025

    Hiring Now: Top Cybersecurity Jobs in September 2025

    A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...

    Read More »
  • Microsoft Launches a Cybersecurity App Store

    Microsoft Launches a Cybersecurity App Store

    Microsoft has launched a Security Store, an online marketplace featuring security SaaS solutions and AI agents to support its Sentinel platform and corporate security strategy. The store offers cybersecurity tools from partners like Darktrace and Tanium, covering threat protection and identity ma...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs for September 2025

    Hiring Now: Top Cybersecurity Jobs for September 2025

    The cybersecurity job market is expanding rapidly due to increasing cyber threats, with high demand for specialized roles across various sectors and countries. Key positions include Chief Information Security Officers (CISOs) who develop security strategies and manage risk, and other roles like C...

    Read More »