Topic: privileged access management

  • Privileged Access: The Next IT Security Battlefield

    Privileged Access: The Next IT Security Battlefield

    Identity and Access Management (IAM) and Privileged Access Management (PAM) are becoming central to security, shifting focus from perimeter defenses to a dynamic, identity-centric posture driven by hybrid work and AI. Passwordless authentication, using hardware keys and biometrics, will see wides...

    Read More »
  • Delinea Acquires StrongDM to Boost Identity Security

    Delinea Acquires StrongDM to Boost Identity Security

    Delinea's acquisition of StrongDM merges enterprise privileged access management with just-in-time authorization, creating a unified platform for continuous environments and non-human identities. The integrated solution enables a shift toward zero standing privilege, reducing the attack surface b...

    Read More »
  • AWS Outage: Keeper Security CEO Darren Guccione Explains the Impact

    AWS Outage: Keeper Security CEO Darren Guccione Explains the Impact

    The recent AWS outage highlighted that operational resilience requires preparing for both cyber threats and technical infrastructure failures, not just security breaches. The disruption impacted a wide range of services, including Slack, Zoom, and gaming platforms, due to their reliance on AWS, w...

    Read More »
  • BeyondTrust Names Felix Gaehtgens VP of Product Strategy

    BeyondTrust Names Felix Gaehtgens VP of Product Strategy

    BeyondTrust has appointed Felix Gaehtgens as Vice President of Product Strategy, signaling a renewed focus on innovation in identity security, privileged access management, and machine identity management. Gaehtgens brings over thirteen years of experience as a Gartner analyst, where he became a ...

    Read More »
  • Scattered Spider Attacks: 3 Crucial Lessons for Insurance Firms

    Scattered Spider Attacks: 3 Crucial Lessons for Insurance Firms

    Insurance companies are increasingly targeted by cybercriminals like Scattered Spider, exploiting weak identity security and help desk procedures to breach major insurers such as Aflac and Erie Insurance. Scattered Spider uses impersonation and social engineering to bypass multi-factor authentica...

    Read More »