Topic: identity management

  • The Looming Threat of Malicious AI Agents

    The Looming Threat of Malicious AI Agents

    Businesses are rapidly adopting AI agents but lack proper security measures, particularly in identity management, creating risks as these non-human workers operate without adequate tracking of their credentials and actions. The core security challenge is that AI agents require access to sensitive...

    Read More »
  • Secure AI Operations with Akeyless AI Agent Identity

    Secure AI Operations with Akeyless AI Agent Identity

    Businesses face urgent security challenges from autonomous AI agents, with Akeyless launching a comprehensive AI Agent Identity Security solution to address vulnerabilities from AI-driven identities. AI agents possess inherent design flaws, such as maintaining awareness of their credentials, whic...

    Read More »
  • OpenID Foundation's Plan to Tame Dangerous AI Agents

    OpenID Foundation's Plan to Tame Dangerous AI Agents

    The rapid adoption of AI agents introduces significant security vulnerabilities, as they can bypass traditional digital security barriers, necessitating new, open identity and access management standards to prevent unauthorized access to sensitive data and processes. AI agents, enabled by technol...

    Read More »
  • Okta's Identity Security Fabric: Securing the AI-Driven Enterprise

    Okta's Identity Security Fabric: Securing the AI-Driven Enterprise

    Securing AI systems is a critical enterprise priority, with Okta introducing an identity security fabric to manage non-human identities and combat AI-driven fraud through tamper-proof credentials. A significant security gap exists as rapid AI adoption has outpaced governance, leaving organization...

    Read More »
  • Future-Proof Cybersecurity: What Actually Works

    Future-Proof Cybersecurity: What Actually Works

    Future-proofing cybersecurity requires strategic focus on core principles like reducing exposure, strengthening identity controls, and leveraging AI responsibly, rather than just adopting the latest tools. Visibility is foundational; organizations must maintain real-time awareness of assets, data...

    Read More »
  • Master Zero Trust & Identity at Today's Virtual Summit

    Master Zero Trust & Identity at Today's Virtual Summit

    The SecurityWeek Zero Trust & Identity Strategies Summit 2025 is a virtual event focusing on modern cybersecurity frameworks and the evolution of Zero Trust into a core strategy for protecting corporate assets. Zero Trust Network Access (ZTNA) is highlighted as essential for strengthening access ...

    Read More »
  • Microsoft's Entra ID Flaws: A Near-Catastrophic Security Risk

    Microsoft's Entra ID Flaws: A Near-Catastrophic Security Risk

    Security researcher Dirk-jan Mollema discovered two severe vulnerabilities in Microsoft’s Entra ID that could have allowed attackers to gain global administrator privileges across nearly all Azure customer environments. The flaws enabled an attacker to impersonate any user in any tenant, potentia...

    Read More »
  • Unified Runtime Platforms: The Future of Posture & Prioritization

    Unified Runtime Platforms: The Future of Posture & Prioritization

    The future of cloud security emphasizes unified runtime platforms that prioritize real-time risk reduction over tool management, enabling CISOs to focus on actionable insights rather than theoretical threats. Transitioning to runtime-first approaches should be framed as strategic enhancements, st...

    Read More »
  • OpenText AI Boosts Enterprise Security for Identity, Data & Apps

    OpenText AI Boosts Enterprise Security for Identity, Data & Apps

    OpenText has launched a suite of cybersecurity enhancements that integrate AI into security workflows, unifying protection across identity, data, applications, and forensics with tools like Core Threat Detection and Core Identity Foundation. The CE 25.4 release strengthens compliance with built-i...

    Read More »
  • Employees Are Outsmarting Company Security Controls

    Employees Are Outsmarting Company Security Controls

    Rapid adoption of AI, SaaS, and personal devices is reshaping work, but traditional security measures like SSO and IAM are failing to keep pace, creating an "access-trust gap." Widespread AI usage sees 73% of employees using AI tools, yet over a third ignore guidelines, and 27% use unauthorized A...

    Read More »
  • Top Infosec Products Launched This Week: July 2025

    Top Infosec Products Launched This Week: July 2025

    The cybersecurity landscape is evolving with new solutions like Cynomi's enhanced platform for business impact analysis and continuity planning, enabling proactive security measures. Tosibox launched TosiANTA, a native anomaly detection module for OT networks, offering quick deployment and improv...

    Read More »
  • #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    #Infosec2025: Why Endpoint Security Remains Critical Against Evolving Threats

    Endpoint security is crucial as cyber threats target corporate devices, IoT, and supply chains, with gaps in protection leaving enterprises vulnerable. Identity breaches and compromised credentials are major attack vectors, exacerbated by poor patch management and BYOD policies. Modern EDR tools ...

    Read More »
  • AI Agents on Your Team: The Unseen Security Risks

    AI Agents on Your Team: The Unseen Security Risks

    AI agents are evolving into autonomous systems that perform complex tasks like incident resolution and system management, introducing significant security challenges alongside efficiency gains. These autonomous agents differ from traditional tools by reasoning, adapting strategies, and accessing ...

    Read More »
  • Europe's Push for Digital Sovereignty: Reclaiming the Stack

    Europe's Push for Digital Sovereignty: Reclaiming the Stack

    Europe is prioritizing digital sovereignty to reduce reliance on foreign tech giants and mitigate strategic risks associated with external control over critical infrastructure. Actions include adopting sovereign cloud platforms, open-source software, and local alternatives to decrease dependencie...

    Read More »
  • The Hidden Toll of CDP Features: Marketers' Imposter Syndrome

    The Hidden Toll of CDP Features: Marketers' Imposter Syndrome

    Marketing teams often build data foundations only to see them become outdated by new technologies, leading to disrupted workflows and diminished confidence. The rapid evolution of marketing technology creates a gap where foundational tasks like data quality and governance are complex yet underval...

    Read More »
  • Insights from Top Leaders on Cybersecurity Awareness Month 2025

    Insights from Top Leaders on Cybersecurity Awareness Month 2025

    The 2025 Cybersecurity Awareness Month in Australia saw unprecedented engagement, highlighting the urgent need for action due to recent high-profile breaches and a rapidly changing threat landscape. Industry experts emphasized that cloud identity vulnerabilities and immediate attack execution req...

    Read More »
  • Top Cybersecurity Jobs Hiring Now | October 2025

    Top Cybersecurity Jobs Hiring Now | October 2025

    Cybersecurity careers are thriving with high demand across sectors like energy, finance, and healthcare, requiring technical skills and strategic thinking to protect infrastructure from evolving threats. Key roles include Threat Intelligence Analysts, Application Security Engineers, and Cloud Sec...

    Read More »
  • Forrester: AI-Powered Data Breach Coming in 2026

    Forrester: AI-Powered Data Breach Coming in 2026

    Forrester predicts a major data breach caused by autonomous AI systems will occur and become public next year, leading to employee terminations and highlighting corporate vulnerabilities. Generative AI tools have already been linked to security incidents, and without proper safeguards, autonomous...

    Read More »
  • The Future is Passkeys: Say Goodbye to Passwords

    The Future is Passkeys: Say Goodbye to Passwords

    Passkeys are emerging as a more secure and user-friendly alternative to traditional passwords, simplifying access to online services while enhancing security. A hybrid environment of passwords and passkeys is expected to persist for years as businesses gradually update systems, with consumer adop...

    Read More »
  • Top 6 Cyber Security Trends Every CISO Must Know in 2025

    Top 6 Cyber Security Trends Every CISO Must Know in 2025

    The cybersecurity landscape is evolving rapidly, with experts at Infosecurity Europe 2025 stressing the need for foundational security practices like human behavior and identity management alongside innovation. Phone-based social engineering attacks are rising, with deepfake technology making voi...

    Read More »
  • PwC: AI Leads Cybersecurity Spending as Top Priority

    PwC: AI Leads Cybersecurity Spending as Top Priority

    Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...

    Read More »
  • Deploy AI Agents Faster & Safer with Rubrik

    Deploy AI Agents Faster & Safer with Rubrik

    Rubrik Agent Cloud is a platform designed to accelerate enterprise AI adoption while managing risks like AI hallucination and malicious compromise. The platform provides comprehensive agent management, including monitoring, governance, and remediation features to ensure security and operational e...

    Read More »
  • Hiring Now: Cybersecurity Jobs in October 2025

    Hiring Now: Cybersecurity Jobs in October 2025

    A variety of cybersecurity roles are available globally in October 2025, including positions for analysts, engineers, consultants, and leadership, with options for remote, on-site, or hybrid work arrangements. Key leadership positions like Chief Information Security Officer (CISO) involve develop...

    Read More »
  • The Hidden Dangers of a Connected World

    The Hidden Dangers of a Connected World

    Cybersecurity risk has expanded beyond IT to include operational technology, IoT devices, and supply chains, requiring strategies like visibility and network segmentation for management. The risk landscape now centers on control planes and concentrated dependencies, where single points like ident...

    Read More »
  • FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access: Hybrid SASE That Scales for All Businesses

    FireCloud Total Access unifies four security protections into a single cloud-managed platform, offering enterprise-level Zero Trust security accessible to managed service providers and smaller IT teams through WatchGuard Cloud. It replaces traditional VPNs with identity-based access controls, pro...

    Read More »
  • Rubrik & Okta Unite to Stop Ransomware with Identity Recovery

    Rubrik & Okta Unite to Stop Ransomware with Identity Recovery

    Rubrik and Okta have partnered to launch Rubrik Okta Recovery, offering automated, immutable backups and granular restoration for Okta Identity Provider environments to combat ransomware and ensure swift recovery. This solution provides operational resilience by protecting Okta tenants from accid...

    Read More »
  • Top Cybersecurity Jobs Hiring in September 2025

    Top Cybersecurity Jobs Hiring in September 2025

    The cybersecurity field is experiencing high demand for professionals in September 2025, with global opportunities available in various roles and work arrangements, including remote positions. Key roles being recruited for include Application Security Engineers, CISOs, Cloud Security Architects, ...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs in September 2025

    Hiring Now: Top Cybersecurity Jobs in September 2025

    A wide range of top cybersecurity roles are available globally in September 2025, reflecting high demand for experts in protecting digital assets across various industries and work arrangements. Key positions include specialized roles such as Application Security Architect, Chief Information Secu...

    Read More »
  • Microsoft Launches a Cybersecurity App Store

    Microsoft Launches a Cybersecurity App Store

    Microsoft has launched a Security Store, an online marketplace featuring security SaaS solutions and AI agents to support its Sentinel platform and corporate security strategy. The store offers cybersecurity tools from partners like Darktrace and Tanium, covering threat protection and identity ma...

    Read More »
  • Hiring Now: Top Cybersecurity Jobs for September 2025

    Hiring Now: Top Cybersecurity Jobs for September 2025

    The cybersecurity job market is expanding rapidly due to increasing cyber threats, with high demand for specialized roles across various sectors and countries. Key positions include Chief Information Security Officers (CISOs) who develop security strategies and manage risk, and other roles like C...

    Read More »