Topic: identity security

  • RadiantOne Adds Composable Remediation and Unified Identity Observability

    RadiantOne Adds Composable Remediation and Unified Identity Observability

    The RadiantOne Platform introduces AI-powered collaborative remediation and a unified observability layer, shifting identity management from reactive monitoring to proactive, continuous posture control to strengthen Zero Trust architectures. A core innovation is an AI Data Assistant (AIDA) that f...

    Read More »
  • Why Ransomware Attacks Spike on Weekends

    Why Ransomware Attacks Spike on Weekends

    Threat actors deliberately target organizations on weekends and holidays when security staffing is minimal, exploiting slower detection to infiltrate systems more deeply. Business transitions like mergers and acquisitions create vulnerabilities, with 60% of incidents occurring after such shifts d...

    Read More »
  • 2026 Cybersecurity Forecast: Key Trends to Watch

    2026 Cybersecurity Forecast: Key Trends to Watch

    Cybercriminals are increasingly targeting people over software vulnerabilities, using tactics like phishing and deceptive applications to breach networks, as seen in the 2025 Salesforce attack by Shiny Hunters. Artificial intelligence tools are creating more sophisticated threats, such as advance...

    Read More »
  • Windows Kernel Flaw Fixed, Fortinet Zero-Day Exploited

    Windows Kernel Flaw Fixed, Fortinet Zero-Day Exploited

    Cybersecurity demands constant vigilance against evolving threats like zero-day exploits and requires organizations to adopt layered defense strategies that combine awareness, collaboration, and resilience. Emerging technologies are reshaping security, with innovations such as touchless Wi-Fi ent...

    Read More »
  • CyberArk Unveils Secure AI Agents to Protect AI Identities

    CyberArk Unveils Secure AI Agents to Protect AI Identities

    Businesses are increasingly adopting AI agents to automate tasks and improve efficiency, but these systems introduce new security risks due to their need for privileged access to sensitive data and systems. CyberArk has launched its Secure AI Agents Solution to address these threats by applying p...

    Read More »
  • BeyondTrust's 2026 Cybersecurity Forecast: Key Trends Ahead

    BeyondTrust's 2026 Cybersecurity Forecast: Key Trends Ahead

    The cybersecurity landscape is increasingly shaped by the convergence of identity management, AI, and geopolitical factors, with AI becoming a major attack vector due to hasty deployments and expanded vulnerabilities. Emerging trends include "AI Veganism" driving demand for transparency, digital ...

    Read More »
  • Qualys Boosts Enterprise Risk Management with AI-Powered Identity Security

    Qualys Boosts Enterprise Risk Management with AI-Powered Identity Security

    Qualys has enhanced its Enterprise TruRisk Management platform with AI-driven identity security features to proactively predict and neutralize emerging cyber threats, focusing on both human and non-human identities. The platform integrates Identity Risk Posture Management, contextual threat intel...

    Read More »
  • Delinea and Microsoft Partner for Identity Security in Microsoft Store

    Delinea and Microsoft Partner for Identity Security in Microsoft Store

    Delinea has joined the Microsoft Security Store Partner Ecosystem, strengthening their long-term collaboration to simplify cybersecurity adoption for organizations globally. As part of the ecosystem, Delinea contributes to development by providing certified solutions and AI agents that integrate ...

    Read More »
  • Sophos Unveils ITDR to Combat Rising Identity Attacks

    Sophos Unveils ITDR to Combat Rising Identity Attacks

    Sophos has launched an Identity Threat Detection and Response (ITDR) solution to combat the rapid rise in identity-based attacks, integrating with its XDR and MDR platforms for continuous monitoring and dark web credential scanning. The urgency for ITDR is underscored by a 106% increase in stolen...

    Read More »
  • AI Arms Race: Rapid7's Craig Adams on the New Cybersecurity Threat

    AI Arms Race: Rapid7's Craig Adams on the New Cybersecurity Threat

    Cybercriminals are increasingly using AI to launch widespread, rapid attacks, compelling businesses to adopt AI-driven defenses to keep pace with the evolving threat landscape. Organizations must prioritize gaining comprehensive visibility into their attack surfaces and consolidating fragmented s...

    Read More »
  • Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian

    Secure Your Microsoft 365 & Hybrid Identity with Cayosoft Guardian

    Cayosoft Guardian Protector offers free, real-time threat detection and monitoring for Microsoft hybrid identity environments, including Active Directory and Entra ID, to defend against ransomware and insider threats without licensing costs. It provides comprehensive visibility and immediate aler...

    Read More »
  • Unlock Cyber Safety: Your 2025 Awareness Guide

    Unlock Cyber Safety: Your 2025 Awareness Guide

    Cybersecurity Awareness Month highlights the need to move beyond basic security practices as machine identities and AI-driven threats create unmanaged attack surfaces that organizations are unprepared for. Experts advise treating machine identities with the same seriousness as human accounts, emb...

    Read More »
  • SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne Leads 2025 IDC XDR MarketScape

    SentinelOne has been named a Leader in the IDC MarketScape for XDR software in 2025, highlighting its AI-native cybersecurity platform, Singularity, which unifies security data and analytics to combat threats effectively. The platform integrates endpoint, cloud, identity, and generative AI securi...

    Read More »
  • BeyondTrust Names Felix Gaehtgens VP of Product Strategy

    BeyondTrust Names Felix Gaehtgens VP of Product Strategy

    BeyondTrust has appointed Felix Gaehtgens as Vice President of Product Strategy, signaling a renewed focus on innovation in identity security, privileged access management, and machine identity management. Gaehtgens brings over thirteen years of experience as a Gartner analyst, where he became a ...

    Read More »
  • Secure Your AI Agents Like Human Users

    Secure Your AI Agents Like Human Users

    AI agents require the same rigorous identity and access management protocols as human employees to prevent data exposure and security vulnerabilities. Organizations face risks from unmanaged "shadow AI" applications and permission sprawl, necessitating centralized control and micro-level security...

    Read More »
  • Jeremy Renner on Resilience: Oktane 2025 Keynote

    Jeremy Renner on Resilience: Oktane 2025 Keynote

    Jeremy Renner emphasized that his role as a father is his top priority, leading him to limit his career to be present for his daughter and valuing family over professional success. He discussed how overcoming early career struggles and a near-fatal accident shaped his resilience, guided by person...

    Read More »
  • Oktane 2025: Securing Every Identity, AI, and App

    Oktane 2025: Securing Every Identity, AI, and App

    The rise of autonomous AI agents in workflows creates unprecedented security challenges, demanding a unified identity security fabric for protection across all users and applications. Legacy authorization models like OAuth are inadequate for AI agents, leading to security blind spots and user cog...

    Read More »
  • BeyondTrust Launches AI Identity Security Controls

    BeyondTrust Launches AI Identity Security Controls

    BeyondTrust has launched new AI identity security controls to help organizations manage and govern AI agents, offering visibility, secure orchestration, and intelligent decision-making support. The platform includes capabilities such as AI agent insights for discovery and risk-scoring, MCP orches...

    Read More »
  • AI Complicates Identity Management: New Challenges Ahead

    AI Complicates Identity Management: New Challenges Ahead

    Identity security is increasingly critical for enterprise protection, but many organizations struggle with the complexities introduced by AI and machine identities, creating significant risks. A majority of companies are in early stages of identity program maturity, relying on manual processes, w...

    Read More »
  • AI and Complexity: The New Identity Protection Challenge

    AI and Complexity: The New Identity Protection Challenge

    Identity security is now a strategic cybersecurity pillar due to remote work, cloud adoption, and digital ecosystems, demanding greater organizational focus. Key challenges include AI-driven threats, low trust in identity providers, fragmented visibility, and underutilization of advanced tools li...

    Read More »
  • Top Open-Source Cybersecurity Tools for August 2025

    Top Open-Source Cybersecurity Tools for August 2025

    Open-source cybersecurity tools are rapidly advancing, offering cost-effective solutions for vulnerability management, identity security, and penetration testing. Notable tools include Buttercup for AI-driven vulnerability patching, EntraGoat for safe identity management training, and LudusHound ...

    Read More »
  • Stellar Cyber Boosts Identity Security with ITDR Features

    Stellar Cyber Boosts Identity Security with ITDR Features

    Stellar Cyber is launching Identity Threat Detection & Response (ITDR) at Black Hat USA 2025, integrating it into its AI-driven SecOps platform to combat credential-based attacks. Identity threats are now the primary attack vector, with 70% of breaches starting with compromised credentials; Stell...

    Read More »
  • AI Security Risks: Even Experts Skip Oversight

    AI Security Risks: Even Experts Skip Oversight

    Cybersecurity teams are increasing AI security risks by using unapproved tools, with 86% of professionals admitting to unauthorized AI usage, often handling sensitive data. Shadow AI—unauthorized AI tool adoption—poses critical vulnerabilities, with 30% of respondents uploading internal documents...

    Read More »
  • Webinar: How Stolen Credentials Threaten Your Network Security

    Webinar: How Stolen Credentials Threaten Your Network Security

    Cybercriminals increasingly use stolen credentials to bypass complex hacking methods, making identity security a top priority, as highlighted in an upcoming July 9th webinar by cybersecurity experts. The webinar will explore credential-based attacks, including infostealer malware and tactics like...

    Read More »
  • AI Transforms Enterprise Ransomware Defense Strategies

    AI Transforms Enterprise Ransomware Defense Strategies

    Ransomware attacks are increasing globally, with 70% of organizations reporting incidents, but fewer are paying ransoms (down from 76% to 57%), as cybercriminals now often threaten data exposure even after payment. Paying ransoms no longer ensures data recovery, with 25% of organizations failing ...

    Read More »