Syndicated Blog

The Benefits of a Converged Identity Credential

The Benefits of a Converged Identity Credential

Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
Aligning With NSA’s Cloud Security Guidance: Four Takeaways

Aligning With NSA’s Cloud Security Guidance: Four Takeaways

The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...
Using Deterministic Security Controls To Stop Generative AI Attacks

Using Deterministic Security Controls To Stop Generative AI Attacks

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
Five Tips to Strengthen Know Your Employee (KYE) Processes

Five Tips to Strengthen Know Your Employee (KYE) Processes

The modern work environment creates situations unthinkable a decade ago. Today, many employees will never step foot in an office or have face-to-face interactions with colleagues. While this flexible work model offers ...
How to Use Context-Based Authentication to Improve Security

How to Use Context-Based Authentication to Improve Security

One of the biggest security weak points for organizations involves their authentication processes. According to Google Cloud’s 2023 Threat Horizons Report, 86% of breaches involve stolen credentials. Our own research found that ...
Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Identity forms the foundation of the modern workplace. Nearly every task depends on the ability to securely access systems using valid digital credentials linked to verified employees. Identity and access management (IAM) ...
Analyst Perspective: Toward Converged Identity Assurance

Analyst Perspective: Toward Converged Identity Assurance

Identity and access management (IAM) is a crucial security component and a business enabler for the modern enterprise — but it’s clear that current systems are falling short on both fronts. Enterprises ...
Best Practices for Identity Proofing in the Workplace

Best Practices for Identity Proofing in the Workplace

With employee identity risk and fraud on the rise — to the point that the FBI has issued a public warning — it’s crucial to ensure that employees are who they say ...