HackDig : Dig high-quality web security articles

2023 identity security trends and solutions from Microsoft

Welcome to 2023! I wanted to kick this year off by having a quick look at the trends in identity security, what you can do about it, and what Microsoft is doing to help you. One of the things we talk about on the team is “shiny object syndrome”—there are a ton of innovative and scary attacks and research out there. Unfortunately, each one tends to pull us in
Publish At:2023-01-26 17:39 | Read:46508 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

​​Microsoft Entra: 5 identity priorities for 2023

Welcome to 2023. After the pandemic upended how we work, learn, play, and manage our lives, we find ourselves more connected than ever, with more convenient access to an ever-wider range of online tools and experiences. But as our global digital footprint continues to grow, so does the risk of cyberthreats. And now, economic uncertainty is challenging the
Publish At:2023-01-09 13:41 | Read:80318 | Comments:0 | Tags:Cybersecurity Identity and access management Identity and ac

How to build a secure foundation for identity and access

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security Senior Product Marketing Manager Brooke Lynn Weenig talks with Christina Richmond, a cybersecurity exp
Publish At:2022-12-19 17:38 | Read:110039 | Comments:0 | Tags:Cybersecurity Identity and access management Voice of the Co

Implementing Zero Trust access to business data on BYOD with Trustd MTD and Microsoft Entra

This blog post is part of the Microsoft Intelligent Security Association guest blog series. Learn more about MISA.  As more employees work remotely on a variety of devices and networks, businesses need a security model that supports this new operational efficiency. An expanding perimeter poses challenges for organizational security, exposin
Publish At:2022-11-30 13:40 | Read:130033 | Comments:0 | Tags:Cybersecurity Identity and access management Microsoft Intel

Token tactics: How to prevent, detect, and respond to cloud token theft

As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an increase in attackers utilizing token theft for this purpose. By
Publish At:2022-11-29 17:37 | Read:154511 | Comments:0 | Tags:Cybersecurity Identity and access management Incident respon

The Role of IAM in Maintaining Cloud Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks.A study conducte
Publish At:2022-06-29 01:05 | Read:405226 | Comments:0 | Tags:Cloud Featured Articles cloud security IAM identity and acce

Building a More Secure Cloud: 5 Strategies for 2022

Cloud adoption continues to soar. More than two-thirds of small to mid-sized businesses intend to increase their use of cloud technologies over the next few years. While the cloud comes with many security benefits, it also carries unique concerns.As the cloud becomes increasingly central to business operations, cloud security should be a priority. Businesses
Publish At:2022-06-01 02:13 | Read:579580 | Comments:0 | Tags:Cloud Featured Articles Automation cloud security cloud stra

Denonia cryptominer is first malware to target AWS Lambda

p>Security researchers at Cado Security, a cybersecurity forensics company, recently discovered the first publicly-known malware targeting Lambda, the serverless computing platform of Amazon Web Services (AWS). Though Lambda has been around for less than ten years, serverless technology is considered relatively young, according to Matt Muir, one of Cado&#
Publish At:2022-04-11 12:48 | Read:867477 | Comments:0 | Tags:Business AWS IAM AWS Lambda C2 Cado Security command & contr

Identity and Access Management – Who You Are & Where You Need to Be

Remember your first day on the job? You might groan just thinking about it, or maybe you are filled with the optimistic nostalgia of all the great things you set out to accomplish.  It’s all a matter of your current perspective.  One of the greatest apprehensions about that first day is meeting all of your new colleagues.  Someone probably gav
Publish At:2021-09-07 00:39 | Read:284767 | Comments:0 | Tags:Security Controls Access Management Authentication IAM ident

The False Identity Frenzy and the Need for Authentication

Emil Sayegh, president and CEO of Ntirety, unpacks the issue of inauthentic identities opening doors to untraceable, fake social accounts and the impact that it has on society. Emil is a cloud visionary and is known as one of the “fathers of OpenStack.”Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com
Publish At:2021-07-12 04:59 | Read:311674 | Comments:0 | Tags:Podcast Authentication identity identity and access manageme

Building on the IAM Benefits of SSO with MFA and Privileged Access Management

In part one of this post, we talked about why identity access management (IAM) is important.  In that discussion, we identified three types of IAM:Single Sign OnMulti-Factor AuthenticationPrivileged Access ManagementWe discussed the different types of single sign on and some examples of what can be used to help streamline the user experience.  Let’s now disc
Publish At:2020-06-14 23:09 | Read:247869 | Comments:0 | Tags:IT Security and Data Protection Access Management identity a

Understanding Single Sign On as a Means of Identity Access Management

I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created an account with around 10 years ago for my kids. They had sent me a code to confirm a login that was being done from Thailand. I had forgotten that I had even created the account. Th
Publish At:2020-05-24 09:59 | Read:200088 | Comments:0 | Tags:IT Security and Data Protection data access identity and acc

Harnessing the power of identity management (IDaaS) in the cloud

Sometimes, consumers have it easy. Take, for example, when they accidentally lock themselves out of their personal email. Their solution? Reset the password. With one click, they’re able to change their old, complicated password with a new, more memorable one. Self-service password reset is awesome like this. For users on a business network, it&#
Publish At:2020-02-18 15:49 | Read:251734 | Comments:0 | Tags:Explained hybrid environment iam IDaaS identity and access m

Takeaways from the 2017 PwC Global State of Information Security Survey

Organizations around the world are taking a more innovative approach to managing threats in today’s digital era, reveals the 19th annual Global State of Information Security Survey (GSISS).This year’s study – produced by PwC in conjunction with CIO and CSO – includes the responses of more than 10,000 business and IT security executives from over 130 countrie
Publish At:2016-10-19 11:45 | Read:186907 | Comments:0 | Tags:Cyber Security Featured Articles Authentication Big Data Clo

What is Intelligent Identity and Access Management?

What is Intelligent IAM?Intelligent IAM (IIAM) encompasses all the administrative processes used in Identity and Access Management (IAM), but the processes are influenced by real‐time data. IAM solutions that use intelligence continuously collect, monitor, and analyze large volumes of identity and access‐related information, combining data not only from prov
Publish At:2016-01-22 21:10 | Read:202533 | Comments:0 | Tags:Uncategorized Vulnerability Management IAM Identity and acce


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud