Identity and access management products
-
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
Pure Storage hit by Snowflake credential hackers
Pure Storage emerges as the latest victim of a fast-spreading breach of Snowflake customers targeting users with lax credential security measures in place Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Jun 2024
More than 160 Snowflake customers hit in targeted data theft spree
Mandiant reports that more than 160 Snowflake customers have been hit in a broad data theft and extortion campaign targeting organisations that have failed to pay proper attention to securing valuable credentials Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
The use of identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
Blog Post
08 Jun 2024
The future of identity in print infrastructure management
Identity-centric infrastructure access management is set to play a critical role in fortifying the printing environment. Continue Reading
By- Louella Fernandes, Quocirca
-
News
03 Jun 2024
97 FTSE 100 firms exposed to supply chain breaches
Between March 2023 and March 2024, 97 out of 100 companies on the UK’s FTSE 100 list were put at risk of compromise following supply chain breaches at third-party suppliers Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jun 2024
Major breaches allegedly caused by unsecured Snowflake accounts
Significant data breaches at Ticketmaster and Santander appear to have been orchestrated through careful targeting of the victims’ Snowflake cloud data management accounts Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 May 2024
Storebrand divests from IBM over supply of biometrics to Israel
Norwegian asset manager Storebrand’s decision to divest from IBM comes amid growing scrutiny of the role technology companies play in Israel’s human rights abuses Continue Reading
-
Definition
15 May 2024
out-of-band authentication
Out-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a separate communication channel along with the typical ID and password. Continue Reading
By- Nick Barney, Technology Writer
-
Opinion
09 May 2024
Zero Trust: Unravelling the enigma and charting the future
A special interest group aims to start a long-overdue discourse on the merits, dangers, costs, and development of Zero Trust and IAM in information security Continue Reading
By -
News
09 May 2024
Ofcom publishes draft online child safety rules for tech firms
In the draft codes, Ofcom calls on technology firms to use ‘robust’ age-checking and content moderation systems to keep harmful material away from children online Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
06 May 2024
Microsoft beefs up cyber initiative after hard-hitting US report
Microsoft is expanding its recently launched Secure Future Initiative in the wake of a hard-hitting US government report on recent nation state intrusions into its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 May 2024
Why IAM is central to cyber security
BeyondTrust’s chief security strategist talks up the importance of identity and access management, and the role of cyber insurance in driving security improvements Continue Reading
-
News
02 May 2024
Dropbox Sign user information accessed in data breach
Account data belonging to Dropbox Sign users was accessed by an unknown threat actor after they hacked into the organisation’s backend infrastructure Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 May 2024
How Okta is fending off identity-based attacks
Okta has been bolstering the security of its own infrastructure and building new tools to scan customer environments for vulnerable identities, among other efforts to fend off identity-based attacks Continue Reading
By- Aaron Tan, TechTarget
-
News
01 May 2024
EMEA CISOs must address human factors behind cyber incidents
The 17th annual Verizon report on data breaches makes for sobering reading for security pros, urging them to do more to address the human factors involved in cyber incidents, and highlighting ongoing issues with zero-day patching Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2024
Keeper to help Williams F1 keep up with cyber challenges
Keeper Security signs up to support F1 team Williams Racing with credential management ahead of the 2024 Miami Grand Prix Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Apr 2024
Global majority united on multilateral regulation of AI weapons
Foreign ministers and civil society representatives say that multilateralism is key to controlling the proliferation and use of AI-powered autonomous weapons, but that a small number of powerful countries are holding back progress Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
29 Apr 2024
digital identity
A digital identity is the body of information about an individual, organization or electronic device that exists online. Continue Reading
-
News
29 Apr 2024
UK’s long-awaited device security law kicks in
The Product Security and Telecommunications Infrastructure Act has become law across the UK, enforcing basic cyber security standards across connected products sold to the public Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Apr 2024
Post Office ‘lied’ to subpostmasters when forced to meet them, says former federation representative
Post Office executives were forced to meet subpostmasters to discuss an unexplained error in their branch, then misled the branch managers over remote access Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
25 Apr 2024
Zero trust is a strategy, not a technology
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading
By- Aaron Tan, TechTarget
-
News
24 Apr 2024
Mandatory MFA pays off for GitHub and OSS community
Mandating multifactor authentication for select developers has been a huge success for GitHub, the platform reports, and now it wants to go further Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Apr 2024
Gov.uk One Login accounts on the rise
Since August 2023, more than 1.8 million people verified their identity using the Gov.uk One Login app, while face-to-face verifications have also increased Continue Reading
By -
News
16 Apr 2024
CW Innovation Awards: Balancing security and user experience
The National University of Singapore’s Safe initiative has strengthened the security of IT systems and end-user devices while prioritising user experience through passwordless access Continue Reading
By -
News
16 Apr 2024
Recognising APAC’s trailblazers in digital transformation
DBS Bank and NUS were among the top industry innovators that were lauded for various transformational initiatives at the Computer Weekly Innovation Awards APAC 2024 Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
15 Apr 2024
Threat actors look to stolen credentials
In 2023, threat actors wrought havoc on corporate networks by logging in through valid accounts, and as bad actors begin investing in AI to help them identify priority targets, this problem is only expected to worsen in the future Continue Reading
By- Martin Borrett
-
News
15 Apr 2024
EU’s AI Act fails to protect the rule of law and civic space
Analysis reveals that the AI Act is ‘riddled with far-reaching exceptions’ and its measures to protect fundamental rights are insufficient Continue Reading
By- Josh Osman, Computer Weekly
-
Definition
12 Apr 2024
OAuth (Open Authorization)
OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet. Continue Reading
-
Feature
12 Apr 2024
5G networks and biometric breakthroughs: Navigating opportunities and risks
Businesses are quickly adopting 5G to introduce advanced security features such as facial recognition, but while these technologies improve safety and ease of use, they also raise concerns about how sensitive biometric information is gathered and may be misused Continue Reading
By -
Feature
12 Apr 2024
European Digital Identity Wallet: One ID for EU citizens
The European Digital Identity Wallet is a personal digital wallet with which you will be able to identify yourself digitally in the future. Is this the solution for a centralised ID? Continue Reading
-
News
11 Apr 2024
Facial recognition to play key role in UK shoplifting crackdown
UK government will fund roll-out of police facial recognition across the country as part of its crackdown on shoplifting and violence against retail staff, but civil society groups say the government is attempting to police its way out of the cost-of-living crisis Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
11 Apr 2024
Government dismisses Lords’ concerns over facial recognition
UK government is claiming police forces’ use of live facial recognition is comprehensively covered by existing laws, in response to a Lords investigation that found police lacked a clear legal basis to deploy it Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Apr 2024
Public worried by police and companies sharing biometric data
More than half of the British public do not feel comfortable with police forces sharing biometric data with the private sector, including facial recognition images, to tackle crimes such as shoplifting Continue Reading
By- Josh Osman, Computer Weekly
-
News
09 Apr 2024
Greek government fined over AI surveillance in refugee camps
Greece’s Data Protection Authority has issued a €175,000 fine against the country’s migration ministry over its deployment of artificial intelligence-powered security systems in refugee camps after the watchdog’s investigation found ‘serious shortcomings’ with the roll-out Continue Reading
-
News
05 Apr 2024
How Oracle Red Bull Racing guards against cyber threats
The F1 team is tapping managed security services, conducting penetration tests and improving security awareness among employees to fend off cyber threats such as phishing and ransomware Continue Reading
-
News
04 Apr 2024
Obituary: Professor Ross Anderson, pioneer in security engineering and campaigner
Ross Anderson, a titan in the field of security engineering and campaigner for privacy and security, has passed away Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
28 Mar 2024
retina scan
Retina scanning is a biometric authentication technology that uses an image of an individual's retinal blood vessel pattern as a unique identifying trait for access to secure installations. Continue Reading
By -
News
28 Mar 2024
UK plc going backwards on cyber maturity, Cisco report claims
Fewer UK organisations believe their cyber security postures have reached a mature level than did so 12 months ago, as they struggle to keep up with new challenges and a fast-evolving threat landscape Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Mar 2024
Cyber spies, not cyber criminals, behind most zero-day exploitation
Analysis from Google has found that zero-day vulnerabilities are much more heavily exploited for espionage purposes than for financially motivated cyber crime Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Mar 2024
NCSC reaffirms guidance for those at risk of Chinese state hacking
As the UK and US governments announce sanctions and indictments of a Chinese state threat actor, the NCSC has reiterated its security advice for individuals at risk of being targeted for espionage purposes Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
21 Mar 2024
Challenging the traditional boundaries between IAM and UEM
It's always refreshing to engage with vendors who aren't bound by the rigid category definitions that large analyst firms often impose on the market. At Freeform Dynamics, our view is that it's ... Continue Reading
By- Dale Vile, Freeform Dynamics
-
News
19 Mar 2024
EMEA security spend will have another boom year in 2024
Cyber security services and technology will once again be the focus of major investment across EMEA during 2024, according to the latest Technology Spending Intentions study from TechTarget and ESG Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Mar 2024
Australia’s cyber security spending to grow 11.5% this year
Highly publicised cyber attacks and growing regulatory obligations are keeping security and risk top of mind for Australian organisations this year, says Gartner Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Mar 2024
Dutch organisations vulnerable to deepfake fraud
With the information many employees share on social media, Dutch companies are especially vulnerable to a new form of fraud Continue Reading
By- Kim Loohuis
-
News
07 Mar 2024
NI Policing Board pressed to open inquiry into PSNI spying on journalists’ phones
Amnesty International and the Committee on the Administration of Justice have asked Northern Ireland’s policing watchdog to open an inquiry into the Police Service of Northern Ireland’s use of surveillance powers against journalists Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
05 Mar 2024
Meta outage disrupts social media globally
Meta services, including Facebook, Instagram and Threads, have been downed in a brief service outage Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Mar 2024
American Express customers exposed through third-party breach
US card giant warns customers that their personal details may have been exposed after a third party experienced a systems breach Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
05 Mar 2024
Authorised access only – biometrics in the workplace
In this week’s Computer Weekly, we examine how biometrics technologies are transforming identity and access management. We analyse research that shows a mismatch between managerial expectations of generative AI and worker experience. And we look at how to assess the best hybrid cloud management tools. Read the issue now. Continue Reading
-
04 Mar 2024
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
-
News
29 Feb 2024
Okta doubles down on cyber in wake of high-profile breaches
Okta launches Secure Identity Commitment to shore up its technology in the wake of a damaging breach and elevate best practice around identity Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Feb 2024
DSIT publishes results of public digital identity trust consultation
Report from Department for Science, Innovation and Technology shows UK public wants government to be accountable and transparent, and views trust and inclusivity as key Continue Reading
By -
News
27 Feb 2024
Majority of UK employees ‘willingly gamble’ with security
Human-centric threats originating from employees continue to damage organisations both financially and reputationally, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Cozy Bear and other APTs changing tack as cloud adoption increases
A change in APT tactics has been observed resulting from greater adoption of cloud-based services, according to the NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
20 Feb 2024
Flying into cloud – EasyJet’s journey out of the datacentre to AI
In this week’s Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There’s only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now. Continue Reading
-
News
14 Feb 2024
Met Police to scrap and replace ‘racist’ Gangs Violence Matrix
A database used by the Metropolitan Police to identify and track people linked with gang violence is being decommissioned and replaced. The decision follows a long-running controversy over its discriminatory impacts on young black people, but campaigners warn that racial discrimination will persist with new tool Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Feb 2024
Amazon defends facial-recognition tech sale to FBI despite moratorium
The FBI has confirmed it is using Amazon’s Rekognition image and video analysis software, but Amazon says it is ‘false’ to suggest this violates the company’s self-imposed moratorium on selling facial-recognition technology to US police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Opinion
07 Feb 2024
Security Think Tank: The phishing forecast for 2024
Egress' Jack Chapman and James Dyer explore how phishing attacks are set to grow in their scope and sophistication this year, with generative AI playing a big role Continue Reading
By- Jack Chapman and James Dyer
-
News
07 Feb 2024
AI ID specialist Onfido in talks to be bought by Entrust
UK-based cyber unicorn Onfido agrees to enter talks to be acquired by Entrust Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
06 Feb 2024
Generative AI – an early adopter’s experience
In this week’s Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer’s guide examines the key security trends for 2024. And Microsoft’s head of identity talks about a future without passwords. Read the issue now. Continue Reading
-
Feature
02 Feb 2024
UK police facial recognition explained: What you need to know
In this essential guide, Computer Weekly looks at the use of facial recognition technology by UK police forces, including the points of contention around its deployment so far and where it’s heading next Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Feb 2024
US government disrupts Chinese botnet containing hundreds of end-of-life Cisco and Netgear routers
The US government has succeeded in halting a botnet comprised of hundreds of end-of-life routers that posed a threat to critical national infrastructure (CNI) organisations in multiple countries Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
29 Jan 2024
Lords question legality of police facial recognition
Lords committee ‘deeply concerned’ about the rapid expansion of live facial recognition by UK police, which it says is progressing without any real oversight or accountability Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
26 Jan 2024
UK government consults on age verification tech in alcohol sales
The government has said it wants to allow the use of digital identities and various age-verification technologies in alcohol sales Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Jan 2024
ICO prompts confusion over police cloud legality
The UK data regulator has suggested that, despite major data protection concerns, it is likely to greenlight police cloud deployments because of an information-sharing agreement with the US government Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
17 Jan 2024
Biometric revolution in IAM: The future of authentication
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity Continue Reading
By -
News
16 Jan 2024
Republic of Ireland publishes progress update on digital strategy
Update reveals 2.3 million people in Ireland now have MyGovID accounts, and the Irish government plans to launch a new digital portal for businesses, as well as establishing an AI advisory council imminently Continue Reading
By -
News
15 Jan 2024
NCA director sacked after WhatsApp and email security breaches
Nikki Holland, former director of investigations at the NCA, was sacked for “misconduct” after sending sensitive NCA information over personal email and WhatsApp Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
12 Jan 2024
UK government seeks public views on impacts of AI-generated porn
The government’s Pornography Review will look in part at the use of AI throughout the industry to generate sexually explicit content without people’s consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
10 Jan 2024
SEC social media hack highlights value of MFA
The US SEC briefly appeared to approve new bitcoin trading rules after a social media account was targeted by troublemakers, proving the value of MFA once again Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Jan 2024
Scotland ‘sleepwalking’ to mass surveillance with DPDI Bill
The independent checks and balances over biometrics and biometric-enabled surveillance must be strengthened to prevent Scotland from sliding into a surveillance state along with the rest of the UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
27 Dec 2023
Top 10 police technology stories of 2023
Here are Computer Weekly’s top 10 police technology stories of 2023 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Dec 2023
Top 10 cyber crime stories of 2023
Ransomware gangs dominated the cyber criminal underworld in 2023, a year that will prove notable for significant evolutionary trends in their tactics Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
20 Dec 2023
What we learned in cyber in 2023, and what to look out for
PA Consulting's Rasika Somasiri looks back at a busy 12 months in the cyber security world, and highlights some key learnings from 2023 Continue Reading
By- Rasika Somasiri
-
Opinion
19 Dec 2023
Security Think Tank: Anytime, anywhere access is achievable
Remote working has enabled people to work from almost anywhere but has piled pressure on cyber pros. Three years after Covid, how are best practices evolving and what can we expect going forward? Continue Reading
By- Tim Holman, 2-sec
-
News
14 Dec 2023
The Security Interviews: Talking identity with Microsoft’s Joy Chik
Microsoft’s president of identity and network access, Joy Chik, joins Computer Weekly to discuss the evolving threat landscape in identity security, using innovations in artificial intelligence to stay ahead, and advocating for the coming passwordless future Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Dec 2023
Top IT predictions in APAC in 2024
Generative AI will continue to leave its mark on many areas in business and IT, along with other trends such as sustainability, cyber security and smart factories that are expected to shape the region’s technology landscape in 2024 Continue Reading
By- Aaron Tan, TechTarget
-
News
01 Dec 2023
Human augmentation tech requires dual use oversight
Researchers investigating human augmentation technologies must acknowledge the potential military applications of their work, and military bodies cannot be allowed to dismiss ethical concerns in their pursuit of national security interests, says NGO Drone Wars UK Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Dec 2023
The Security Interviews: Mark McClain, SailPoint Technologies
SailPoint founder and CEO Mark McClain reflects on how the concept of identity has evolved over the past 20 years, and points to rapid evolution still to come Continue Reading
By- Alex Scroxton, Security Editor
-
News
29 Nov 2023
Scope of Okta helpdesk breach widens to impact all users
Okta has widened the scope of the October breach of its systems to include every customer that has used its helpdesk service, after new information came to light Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
28 Nov 2023
privileged identity management (PIM)
Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an organization's IT environments. Continue Reading
By -
Feature
27 Nov 2023
How passwordless authentication aids identity security
Enterprise Strategy Group's Jack Poller discusses survey results on user authentication practices and explains the security benefits of passwordless methods. Continue Reading
By- Craig Stedman, Industry Editor
-
News
24 Nov 2023
UK police plan national roll-out of facial-recognition phone app
UK police chiefs plan to expand use of facial-recognition technology through a nationwide roll-out of mobile-based tools and increases in retrospective facial-recognition, but oversight problems persist Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
23 Nov 2023
Australia ups ante on cyber security
Australia’s new cyber security strategy will focus on building threat-blocking capabilities, protecting critical infrastructure and improving the cyber workforce, among other priorities Continue Reading
-
News
22 Nov 2023
An inside look at a Scattered Spider cyber attack
Threat researchers at ReliaQuest share the inside track on a Scattered Spider cyber attack they investigated Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
21 Nov 2023
possession factor
The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. Continue Reading
By -
News
21 Nov 2023
Canada’s Mounties among government employees hit by LockBit
A LockBit attack on a specialist supplier of relocation services has engulfed multiple government agencies in Canada Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Nov 2023
Outgoing police tech watchdog warns of declining oversight
The outgoing biometrics and surveillance camera commissioner for England and Wales discusses police deployment of powerful new surveillance technologies, and the declining state of oversight in this area Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
09 Nov 2023
mandatory access control (MAC)
Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system. Continue Reading
By -
News
06 Nov 2023
Shadow IT use at Okta behind series of damaging breaches
Okta now believes the initial access vector in a series of damaging breaches was one of its own employees who used a corporate device to sign into their personal Google account Continue Reading
By- Alex Scroxton, Security Editor
-
News
02 Nov 2023
EU digital ID reforms should be ‘actively resisted’, say experts
Over 300 cyber security experts have called for the EU to rethink its proposals for eIDAS digital identity reforms, saying some of the provisions risk damaging user privacy and security Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Oct 2023
Microsoft warns over growing threat from Octo Tempest gang
The English-speaking Octo Tempest extortion gang – which became an ALPHV/BlackCat affiliate recently – presents one of the most significant and rapidly growing threats to large organisations at this time, says Microsoft Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Oct 2023
Demystifying the top five OT security myths
Goh Eng Choon, president of ST Engineering’s cyber business, outlines the common myths around OT security in a bid to raise awareness of the security challenges confronting OT systems Continue Reading
By- Aaron Tan, TechTarget
-
News
25 Oct 2023
1Password caught up in Okta support breach
After breaches at BeyondTrust and Cloudflare, 1Password, a third customer of Okta operating in the same space, has revealed that it too was impacted in a breach of the IAM house’s support systems Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
20 Oct 2023
soft token
A soft token is a software-based security token that generates a single-use login personal identification number (PIN). Continue Reading
By -
20 Oct 2023
How to tame the identity sprawl
Organisations should find a comprehensive way to gain full visibility into their digital identities and leverage automation to tame the identity sprawl. Continue Reading
-
20 Oct 2023
CyberArk eyes growth beyond PAM
Aaron Tan examines CyberArk’s exponential growth in the broader identity security market. Continue Reading
-
E-Zine
20 Oct 2023
CW APAC: Buyer’s guide to IAM
Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk’s growth, the uses of automation and how ForgeRock enhances user experience. Continue Reading
-
20 Oct 2023
APAC guide to identity and access management
The rise of identity-based attacks is fuelling investments in identity and access management tools. Continue Reading
-
News
19 Oct 2023
Loughborough Uni to create five cyber AI research posts
Supported by Darktrace, Loughborough University is to recruit five doctoral researchers focusing on cross-disciplinary research in AI and cyber security Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
18 Oct 2023
Google Authenticator
Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources. Continue Reading