Geek-Guy.com

Tag: Identity and Access Management (IAM)

How to Create Identity and Access Governance In and Across Clouds

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]

The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.

Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale

As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees, and thousands of applications and IoT devices to the mix and you start to understand how important identity and access management (IAM) is.  What Exactly […]

The post Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale appeared first on Security Intelligence.

IAM Secures the New, Perimeter-less Reality

Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform rapidly. Today, many of us work from home. Remote and hybrid work models have become the new normal. But what about security?  In one recent survey, 70% of office workers admitted to using their […]

The post IAM Secures the New, Perimeter-less Reality appeared first on Security Intelligence.

Integrating IAM and SIEM to Boost Event and Anomaly Detection

Sending information from your identity and access management (IAM) system to your security information and event management (SIEM) system can help you to find events and anomalies that you might not find otherwise. This can help you detect that an attacker has breached your systems. Your SIEM system might already be collecting a lot of […]

The post Integrating IAM and SIEM to Boost Event and Anomaly Detection appeared first on Security Intelligence.

What You Need to Know About Data Encryption Right Now

You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you roll your eyes because you have the good intention of taking care of […]

The post What You Need to Know About Data Encryption Right Now appeared first on Security Intelligence.

IAM OT Security Risks Call for Strategic Defenses

Today’s technology requires today’s identity and access management (IAM). In the past, operational technology (OT) systems were physically and logically separated from a company’s enterprise corporate business environment and the external world. That served as a control to protect them from common cyberattacks. Starting in the 1970s, serial-based analog processes controlled, managed and monitored these […]

The post IAM OT Security Risks Call for Strategic Defenses appeared first on Security Intelligence.

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]

The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.

Identity and Access Management: What’s Driving the Rush?

A recent Fortune Business Insights report projects that the global Identity and Access Management (IAM) market (valued at $9.53 billion in 2018) will reach $24.76 billion by the end of 2026, showing a CAGR of 13.17%. What’s behind this massive demand? In a nutshell, people don’t want their identities stolen. But the real drivers are […]

The post Identity and Access Management: What’s Driving the Rush? appeared first on Security Intelligence.

Nobelium Espionage Campaign Persists, Service Providers in Crosshairs

In an advisory released on October 24, Microsoft announced ongoing campaigns it has attributed to the Nobelium state-sponsored threat group. IBM X-Force tracks this group as Hive099. If the name sounds familiar, that’s because it is the same group that targeted SolarWinds in 2020. The U.S. government has identified Nobelium as part of Russia’s foreign […]

The post Nobelium Espionage Campaign Persists, Service Providers in Crosshairs appeared first on Security Intelligence.

Supply Chain Attack: What It Is (and What to Do About It)

The past two years have delivered major disruptions for supply chains. The pandemic pushed supply chain attack issues front-and-center, with disruptions up 67% in 2020 and problems expected to persist as global markets adjust to ‘new normal’ operations. Increasing reliance on digital supply solutions, however, has also set the stage for increasing supply chain attacks. […]

The post Supply Chain Attack: What It Is (and What to Do About It) appeared first on Security Intelligence.

What is Web Application Security? A Protective Primer for Security Professionals

Evolving threats put applications at risk. Robust web application security can help prevent compromise before it happens. Not sure where to start? Our protective primer has you covered. What Is Web Application Security? Web application security focuses on the reduction of threats through the identification, analysis and remediation of potential weaknesses or vulnerabilities. While the bulk […]

The post What is Web Application Security? A Protective Primer for Security Professionals appeared first on Security Intelligence.

6 Benefits of Using Privileged Access Management

When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other aspects to consider as well. Using the full spectrum offered by Privileged Access Management (PAM) can help. It’s easy to focus on the glitzier sides […]

The post 6 Benefits of Using Privileged Access Management appeared first on Security Intelligence.