In today’s digital landscape, identity security has significantly evolved, expanding beyond the traditional capabilities of identity and access management and aligning more with cybersecurity strategies. Threat actors have also developed and capitalized on this evolution, leveraging identity and privilege as the most common means to breach an organization and cause disruption. They exploit every identity—human…
Archives
-
Ask the Cybersecurity Experts: Why the Success of Modern Cyber Defense Hinges on Identity Security
This article was original published by BeyondTrust. You can view the article here. An interview with cybersecurity experts from BeyondTrust: Janine Seebeck, Chief Executive Officer; Morey J. Haber, Chief Security Advisor; James Maude, Director of Research; Brad Call, Information Security Engineer; and Angela Duggan, Vice President of User Experience. Today is Identity Management Day (IMD), a day for raising…
-
Why Identity Security Should Be the Basis of Modern Cybersecurity
This article was originally published by BeyondTrust. You can view the article here. An Interview with the Authors of the latest book in the Attack Vector series, Morey J. Haber, Chief Security Advisor, BeyondTrust, and Darran Rolls, Identity, Security, Privacy & Compliance Advocate. It is easier for a threat actor to log in versus hack…
-
Workforce Identity Security Best Practices: The Essential Role of Unified Identity Protection
This article was originally published by BeyondTrust. You can view the article here. In any corporate environment, every worker needs access to multiple systems from day one (Active Directory, Okta, HR applications, Salesforce, finance tools—the list goes on and on). Those already numerous accounts—and privileges—then accumulate over time (privilege creep) as that employee changes roles…
-
NIST Cybersecurity Framework 2.0 – What’s New & What You Need to Know
This article was originally published by BeyondTrust. You can view the article here. Last week, NIST released Version 2.0 of the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The NIST Cybersecurity Framework 2.0 has emerged not just as an update, but also as a transformative approach to securing digital assets and…
-
Why You Must Protect Your Digital Identity at All Costs
Identities are under attack from all sides. The risk surface is increasing exponentially, and threat actors are endlessly inventing more sophisticated and nefarious means for identity-based attacks. At the same time, digital identities are becoming more complex. Each identity can—and does—have multiple accounts, credentials, entitlements, rights, and privileges. While some accounts may be more secure…