One Identity
Returning to the office? Time to reassess privileged access permissions
As more of the population becomes vaccinated against COVID-19, organizations are preparing to return to the office. In the emerging hybrid environment, where employees can …
How do I select an identity management solution for my business?
According to a recent survey, the pandemic-driven shift to remote work has significantly changed how companies are investing in identity and access management capabilities and …
Migration delays prevent AD-centric zero trust security framework adoption
37 percent of IT professionals rated rapid changes in their AD/AAD environment as the key impact of COVID-19 on their organization’s identity management team, a One Identity …
As offices emptied and remote work became the norm, security teams struggled
One Identity released a global survey that reveals attitudes of IT and security teams regarding their responses to COVID-19-driven work environment changes. The results shed …
Why you should be rushing to deploy multi-factor authentication to support remote work
With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …
Do third-party users follow security best practices and policies?
Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security …
Impact and prevalence of cyberattacks that use stolen hashed administrator credentials
There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within …
Protecting your organization against privileged identity theft
What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the …
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies
Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …
AI won’t solve all of our cybersecurity problems
AI is already supporting businesses with tasks ranging from determining marketing strategies, to driverless cars, to providing personalized film and music recommendations. And …
Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …
One Identity acquires Balabit to bolster PAM solutions
One Identity announced the acquisition of Balabit, terms of the transaction were not disclosed. Balabit’s PAM solution provides protection from threats posed by high-risk, …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down