News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Authorization controls for identities strengthen cyber security
Authorization controls for identities strengthen cyber security

As the number of identities in organizations continues to grow, so do identity-related attacks. Companies are faced with a dynamic growth of identities: both machines and people. There are currently 45 machine identities for every human identity. In 2023, the total number of identities is expected to at least double. Parallel to this development, the number of identity-related attacks – for example using ransomware or phishing – is also increasing dramatically. Security concepts for digital identities How can a company get this complex situation under control? The answer is: with a…

Read more

New zero-trust approach at the identity level

Zero Trust has now become one of the most important security models. The concept is simple and intuitive: implicit trust is a vulnerability in itself, which attackers can exploit for lateral movement and access to sensitive data. The Zero Trust approach attempts to mitigate this risk by eliminating implicit trust from the corporate environment. Zero Trust always assumes that a security breach has already occurred. For example, an attacker managed to bypass some of the defenses in place and gain a foothold in the enterprise environment. In the next attack phase, the hacker moves...

Read more

Problem area: weak point access data

Credentials vulnerability: Identity and access management best practices. When it comes to passwords, their online presence offers companies a broad digital attack surface that cyberattackers can break through in various ways. If they succeed in stealing valid access data from an account, they can use the hijacked identity to steal valuable data or cause further damage in corporate environments. In a working world that is increasingly characterized by remote work, the security and credibility of digital identities are gaining new relevance. Similar to physical forms of identification, digital forms of identification must also be reliably protected against misuse, theft and fraud. The digital ...

Read more