News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Identity and Access Management (IAM) alone is not enough
Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM. Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because...

Read more

AI innovation at the control level for machine identities
AI innovation at the control level for machine identities - Image by Jorge Franganillo on Pixabay

Venafi Athena enables the use of generative AI and machine learning to deliver the industry's first intelligent machine identity management capabilities. This makes machine identity management easier and faster for IT security teams. Venafi, pioneer of machine identity management, presents Venafi Athena at the 5th edition of the Machine Identity Summit. As an AI technology for the Venafi Control Plane, Venafi Athena combines the strengths of machine learning, large language models and Venafi's industry-leading data capabilities. This makes machine identity management easier and faster for IT security and platform teams. Venafi Athena runs across the entire Venafi Control Plane. The integrated network offers three core functions for…

Read more

Identity Access Management – ​​seven myths
Identity Access Management – ​​seven myths

Remote work and cloud services are increasingly taking important business processes outside of the corporate network. This shift in security perimeters makes cybercriminals more likely to target employees, vendors, and bots. Identity security solutions enable efficient management of user accounts and access policies to meet compliance requirements and minimize the risk of data breaches. Klaus Hild, Principal Identity Strategist at SailPoint Technologies, explains the most common myths and shows which pitfalls need to be avoided to make identity access management (IAM) a success. 1. IAM is a project When introduced…

Read more

User Accounts: Hidden Danger From Shadow Admins

Shadow admin accounts are overprivileged user accounts that were inadvertently assigned. If a hacker compromises a shadow admin account, this poses a high risk to company security. Silverfort lists best practices against accounts with too high privileges. If an attacker can hijack privileged accounts and access their target systems, this massively endangers an entire network. However, identifying shadow admins and restricting their privileges is not an easy task. The following explains how shadow administrators emerge and what measures companies can take to effectively contain this hidden danger. This is how shadow administrator accounts are created...

Read more

Study: Cloud automation as a key to cybersecurity
Study: Cloud automation as a key to cybersecurity

Despite the tense security situation, companies overestimate the effectiveness of their security measures. A study shows that cloud automation can be the key to future-proof cybersecurity. The majority of IT decision-makers see cloud automation as an important key to future-proof cyber security, especially in combination with autonomous privileges and access. This is the result of a recent survey by Delinea, a leading provider of privileged access management (PAM) solutions. 86 percent of those surveyed are currently looking for ways to automate access controls, especially for privileged access. At the same time, companies are also increasing their resources to meet the growing threat landscape….

Read more

ThycoticCentrify improves Secret Server usability
B2B Cyber ​​Security ShortNews

Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide more protection...

Read more

Over 50 percent: Security incidents in DevOps environments 
Over 50 percent: Security incidents in DevOps environments

A Forrester survey shows that centralizing secrets and using unified tools is key to securing DevOps innovation. 57 percent of companies have suffered security incidents with disclosed secrets in DevOps. ThycoticCentrify, a leading provider of cloud identity security solutions, born from the merger of two market leaders in Privileged Access Management (PAM), Thycotic and Centrify, commissioned a survey from Forrester to examine the paradox of security innovation in DevOps environments. The study shows that more than half of companies have had security incidents related to ...

Read more

Identity and access management for Azure Active Directory
B2B Cyber ​​Security ShortNews

Silverfort Unified Identity Protection Platform for Microsoft Azure Active Directory. The platform now enables organizations to centralize identity and access management (IAM) for cloud and legacy on-premises resources on Azure Active Directory, including those that could not previously be migrated. Silverfort, a Unified Identity Protection company and member of the Microsoft Intelligent Security Association (MISA), now enables companies to consolidate identity and access management for all devices, applications and environments on Microsoft Azure Active Directory (Azure AD). Unified Identity Protection Platform for Azure With the Silverfort Unified Identity Protection Platform ...

Read more

Critical: identity-based attacks
Critical: identity-based attacks

Identity-based attacks are one of the greatest threats to IT security today, as modern hybrid corporate networks offer cybercriminals numerous gateways. A comment from Martin Kulendik, Regional Sales Director DACH at Silverfort. Hackers, for example, use hijacked accounts to gain initial access via SaaS apps and IaaS in the public cloud or penetrate the company perimeter via compromised VPN or Remote Desktop Protocol (RDP) connections. Hackers can then continue their attacks from one machine to the next using compromised credentials. Lateral movement of this type occurs in both Advanced Persistent Threats (APT) and ...

Read more

Companies rely on IAM and PAM in the cloud

Identity security in the cloud: 89 percent of companies rely on IAM and PAM in the cloud. ThycoticCentrify Study: Protecting Digital Identities from Risks from Increasing Identity Sprawl. Companies are increasingly relying on cloud-based identity and access management (IAM): 89 percent have implemented best-of-breed solutions for IAM and / or privileged access management (PAM) in cloud environments, which are increasingly hybrid or multi-cloud . This is the result of a new study by ThycoticCentrify, a leading provider of cloud identity security solutions, which emerged from the merger of the leading providers of Privileged Access Management (PAM) Thycotic and Centrify. 150 IT decision-makers were asked for the study ...

Read more