Please turn on your JavaScript for this page to function normally.
identity
Unlocking the value of AI-powered identity security

While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every …

identity
The role of self-sovereign identity in enterprises

As personal data becomes increasingly commodified and centralized, the need for individuals to reclaim control over their identities has never been more urgent. Meanwhile, …

John Yeoh
Securing non-human identities: Why fragmented strategies fail

In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now …

email
Organizations are making email more secure, and it’s paying off

Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of …

identity risks
Rising identity security risks: Why organizations must act now

As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are …

keys
Gateways to havoc: Overprivileged dormant service accounts

Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and …

eyes
Organizations still don’t know how to handle non-human identities

Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of …

identity
How CISOs enable ITDR approach through the principle of least privilege

Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. …

digital identity
Fighting AI-powered synthetic ID fraud with AI

Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud …

privacy
Risk related to non-human identities: Believe the hype, reject the FUD

The hype surrounding unmanaged and exposed non-human identities (NHIs), or machine-to-machine credentials – such as service accounts, system accounts, certificates and …

Swissbit iShield Key Pro
Product showcase: Protect digital identities with Swissbit’s iShield Key Pro

In today’s fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these …

quantum computing
Preparing for a post-quantum future

Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This …

Don't miss

Cybersecurity news