Identity Management

Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...
Enzoic Acquires VeriClouds
Enzoic | | account takeover, credential screening, Cybersecurity, Data breaches, Enzoic News, Password Security
VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand ...
E-commerce Fraud Prevention: Securing Your Business and Trust
Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers ...
Good Essay on the History of Bad Password Policies
Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but ...

Why Open-Source CIAM Solutions Are Essential for Data Security and Privacy
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | CIAM, developers, Digital Identity, iam, open source
Businesses face mounting cyber threats and data breaches from third-party vendors. Open-source CIAM solutions offer a secure, transparent alternative for customer identity management. Discover how these solutions provide enhanced security, complete data ...
Beyond SAP Access Control: Unlocking Cross-Application GRC
Keri Bowman | | Access Governance, access management, application access governance, cross-application, GRC, SAP, SAP Access Control, Security Compliance
As organizations transition to modern, cloud-centric environments, traditional SAP Access Control (AC) solutions are often unable to keep pace with the expanding application landscape. While SAP AC offers solid access risk management ...

These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
Richi Jennings | | CVE-2024-10914, D-Link, D-Link Corporation, D-Link NAS Devices, D-Link vulnerability, D-Link zero day, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iot, NAS, network storage device, SB Blogwatch
‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability ...
Security Boulevard

Vlog: How Can Remote Caller Verification Protect Your Organization From Social Engineering?
Mike Engle: Hi, everybody. My name is Mike Engle, co-founder and head of strategy here at 1Kosmos. I’m joined today by Jens Hinrichsen. Say hello, Jens. Jens Hinrichsen: Hello, everybody. Mike Engle: ...

MFA Vulnerabilities, ATO, and the Importance of Password Security
The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective ...
Beyond IGA: How Pathlock Enables Secure and Compliant Elevated Access
Keri Bowman | | Access Governance, access management, audit readiness, elevated access management, Security Compliance
When it comes to granting access, following the principle of least privilege (Zero Trust) is almost a given. It’s a simple rule that ensures users only have access to the specific resources ...