Identity & Access

Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...
Enzoic Acquires VeriClouds
VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand ...
E-commerce Fraud Prevention: Securing Your Business and Trust
Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers ...
Good Essay on the History of Bad Password Policies
Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, complete data ...
Beyond SAP Access Control: Unlocking Cross-Application GRC
As organizations transition to modern, cloud-centric environments, traditional SAP Access Control (AC) solutions are often unable to keep pace with the expanding application landscape. While SAP AC offers solid access risk management ...

These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability ...

Vlog: How Can Remote Caller Verification Protect Your Organization From Social Engineering?
Mike Engle: Hi, everybody. My name is Mike Engle, co-founder and head of strategy here at 1Kosmos. I’m joined today by Jens Hinrichsen. Say hello, Jens. Jens Hinrichsen: Hello, everybody. Mike Engle: ...

MFA Vulnerabilities, ATO, and the Importance of Password Security
The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective ...
Beyond IGA: How Pathlock Enables Secure and Compliant Elevated Access
When it comes to granting access, following the principle of least privilege (Zero Trust) is almost a given. It’s a simple rule that ensures users only have access to the specific resources ...