The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Harnessing the Power of Security Automation
Jun 09, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Harnessing the Power of Security Automation
Jun 09, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Harnessing the Power of Security Automation
Jun 09, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | <REGISTER NOW>
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Identity & Access Management
Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools & technologies for security teams.
After the Okta Breach, Diversify Your Sources of Truth
What subsequent protections do you have in place when your first line of defense goes down?
May 23, 2022
What subsequent protections do you have in place when your first line of defense goes down?
by Gal Diskin, CTO and Co-Founder, Authomize
May 23, 2022
4 min read
Article
A Third of Americans Use Easy-to-Guess Pet Passwords
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.
May 05, 2022
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.
by Dark Reading Staff, Dark Reading
May 05, 2022
1 min read
Article
DoD Scammed Out of $23M in Phishing Attack on Jet-Fuel Vendors
A California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
May 02, 2022
A California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
by Dark Reading Staff, Dark Reading
May 02, 2022
1 min read
Article
LinkedIn Brand Now the Most Abused in Phishing Attempts
New research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
April 20, 2022
New research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
by Dark Reading Staff, Dark Reading
April 20, 2022
2 min read
Article
Cybersecurity Mesh: IT's Answer to Cloud Security
With a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
April 04, 2022
With a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
by John Donegan, Enterprise Analyst at ManageEngine
April 04, 2022
5 min read
Article
Okta Says 366 Customers Impacted via Third-Party Breach
Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
March 23, 2022
Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
by Jai Vijayan, Contributing Writer
March 23, 2022
7 min read
Article
SentinelOne to Buy Attivo Networks in $616.5M Deal
Attivo's identity threat detection and response is "an integral part" of SentinelOne's XDR strategy, SentinelOne CEO says.
March 15, 2022
Attivo's identity threat detection and response is "an integral part" of SentinelOne's XDR strategy, SentinelOne CEO says.
by Dark Reading Staff, Dark Reading
March 15, 2022
1 min read
Article
Identity Attacks Threaten Workloads, Not Just Humans
Companies have embraced the cloud and accelerated adoption, but with insider access to infrastructure even more available, can businesses defend their expanded attack surface?
March 11, 2022
Companies have embraced the cloud and accelerated adoption, but with insider access to infrastructure even more available, can businesses defend their expanded attack surface?
by Robert Lemos, Contributing Writer
March 11, 2022
6 min read
Article
Microsoft Debuts Unified Service for Multicloud ID Management
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
February 23, 2022
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
by Robert Lemos, Contributing Writer
February 23, 2022
4 min read
Article
Why Passwordless Is at an Impasse
Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.
February 23, 2022
Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.
by Hemen Vimadalal, CEO and Co-Founder of 1Kosmos
February 23, 2022
4 min read
Article
NSA Issues Guidance for Selecting Strong Cisco Password Types
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
February 17, 2022
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
by Jai Vijayan, Contributing Writer
February 17, 2022
4 min read
Article
8 of the Biggest Cybersecurity M&As; & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.
February 14, 2022
There were more financial deals in cybersecurity last year than in any previous year.
by Jai Vijayan, Contributing Writer
February 14, 2022
1 min read
Article
The Zero-Trust Timer Is on for Federal Agencies — How Ready Are They?
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.
January 31, 2022
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.
by Ericka Chickowski, Contributing Writer
January 31, 2022
4 min read
Article
With Cloud the Norm, Insiders Are Everywhere — and Pose Greater Risk
After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies.
January 27, 2022
After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies.
by Robert Lemos, Contributing Writer
January 27, 2022
4 min read
Article
1Password Raises $620M Series C, Now Valued at $6.8B
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
January 19, 2022
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
by Dark Reading Staff, Dark Reading
January 19, 2022
2 min read
Article