searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

One Identity

Get our top stories in your inbox

Beyond Identity announces integrations with leading SSO providers

April 22, 2022

Beyond Identity announced integrations with additional single sign-on (SSO) solutions from CyberArk, Google Cloud, OneLogin by One Identity, Shibboleth, and VMware to …

The current state of zero trust: Awareness is high, adoption is lagging

December 8, 2021

One Identity released global survey findings that unpack the current state of zero trust awareness and adoption across the enterprise. As zero trust awareness continues to …

Fragmented approach to identity security management creates risk

November 5, 2021

One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has …

SecZetta partners with One Identity to automate identity access for third-party users

October 9, 2021

SecZetta announced a new integration in partnership with One Identity. The integration of the SecZetta Third-Party Identity Risk solution with the One Identity Active Roles …

One Identity acquires OneLogin to help organizations enhance their identity security

October 5, 2021

One Identity acquired OneLogin to expand the scope of One Identity’s Unified Identity Security Platform. Combined with its existing Privileged Access Management (PAM), …

Returning to the office? Time to reassess privileged access permissions

May 24, 2021

As more of the population becomes vaccinated against COVID-19, organizations are preparing to return to the office. In the emerging hybrid environment, where employees can …

How do I select an identity management solution for my business?

April 21, 2021

According to a recent survey, the pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and …

Migration delays prevent AD-centric zero trust security framework adoption

December 17, 2020

37 percent of IT professionals rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity management team, a One Identity …

As offices emptied and remote work became the norm, security teams struggled

October 28, 2020

One Identity released a global survey that reveals attitudes of IT and security teams regarding their responses to COVID-19-driven work environment changes. The results shed …

Why you should be rushing to deploy multi-factor authentication to support remote work

May 5, 2020

With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

Do third-party users follow security best practices and policies?

November 21, 2019

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

October 10, 2019

There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within …

Posts navigation

1 2

Featured news

  • RansomHouse: Bug bounty hunters gone rogue?
  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
Easily migrate to the cloud with CIS Hardened Images

What's new

Vishing cases reach all time high

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

Account pre-hijacking attacks possible on many online services

Don't miss

Account pre-hijacking attacks possible on many online services

RansomHouse: Bug bounty hunters gone rogue?

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

How confident are CISOs about their security posture?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise