www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

Submitted URL: https://www.darkreading.com/identity-and-access-management//
Effective URL: https://www.darkreading.com/identity-and-access-management
Submission: On December 22 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022
 * Cloud Security Strategies for Today's Enterprises
   Jan 06, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext



IDENTITY & ACCESS MANAGEMENT


Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself
Solutions?
The functionality of all-in-one platforms is being deconstructed into a
smorgasbord of services that can be used to develop bespoke end-user security
procedures for specific work groups, lines of businesses, or customer
communities.
December 22, 2021
The functionality of all-in-one platforms is being deconstructed into a
smorgasbord of services that can be used to develop bespoke end-user security
procedures for specific work groups, lines of businesses, or customer
communities.

by Mark Settle, Seven-Time CIO
December 22, 2021
5 min read

Operations


Article
Zero Trust Shouldn’t Mean Zero Trust in Employees
Some think zero trust means you cannot or should not trust employees, an
approach that misses the mark and sets up everyone for failure.
December 20, 2021
Some think zero trust means you cannot or should not trust employees, an
approach that misses the mark and sets up everyone for failure.

by Josh Yavor, CISO, Tessian
December 20, 2021
4 min read

Endpoint


Article

Newly Found Authentication Flaws Highlight Dangers of Coding From Scratch
Two vulnerabilities in a call-center software suite could allow an attacker to
take over the application server, researchers found.
December 08, 2021
Two vulnerabilities in a call-center software suite could allow an attacker to
take over the application server, researchers found.

by Robert Lemos, Contributing Writer
December 08, 2021
4 min read

Application Security


Article
How Criminals Are Using Synthetic Identities for Fraud
Organizations must improve their cybersecurity protocols to detect fraudulent
identities and make sure they're safeguarding their consumers’ personal
information.
December 03, 2021
Organizations must improve their cybersecurity protocols to detect fraudulent
identities and make sure they're safeguarding their consumers’ personal
information.

by Tatiana Walk-Morris, Contributing Writer
December 03, 2021
5 min read

Edge Articles


Article
GBG Announces It Has Agreed to Acquire Acuant
GBG announces it has agreed to acquire Acuant, bringing together two leaders in
the global digital identity market with combined revenue of c.£265 million.
November 18, 2021
GBG announces it has agreed to acquire Acuant, bringing together two leaders in
the global digital identity market with combined revenue of c.£265 million.
November 18, 2021
6 min read

Operations


Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their
approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their
approaches to protecting businesses and users.

by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
5 min read

The Cyber Future


Article
What Security Strategies Are Driving InfoSec's Decisions Around Defense?
The data shows security leaders are focusing on multilayered defenses, including
multifactor authentication, threat intelligence, and incident response.
November 08, 2021
The data shows security leaders are focusing on multilayered defenses, including
multifactor authentication, threat intelligence, and incident response.

by Dark Reading Staff, Dark Reading
November 08, 2021
2 min read

Tech Trends


Article
Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes?
Incentives for good conduct and deterrents for bad behavior in cyberspace are
impossible to effectively establish and enforce without international
collaboration and commitment.
November 08, 2021
Incentives for good conduct and deterrents for bad behavior in cyberspace are
impossible to effectively establish and enforce without international
collaboration and commitment.

by Cristin J. Monahan, Cyber Vault Fellow at National Security Archive
November 08, 2021
5 min read

Attacks/Breaches


Article
SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises
Acceptto’s contextual behavior threat intelligence technology will help
SecureAuth deliver AI-driven MFA and continuous password-less authentication,
SecureAuth says.
November 06, 2021
Acceptto’s contextual behavior threat intelligence technology will help
SecureAuth deliver AI-driven MFA and continuous password-less authentication,
SecureAuth says.

by Dark Reading Staff, Dark Reading
November 06, 2021
2 min read

DR Tech


Article
How Is Zero Trust Different From Traditional Security?
Unlike traditional security approaches, the zero-trust security model verifies a
user's identity each and every time they need specific system access.
November 04, 2021
Unlike traditional security approaches, the zero-trust security model verifies a
user's identity each and every time they need specific system access.

by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
November 04, 2021
1 min read

Edge Ask the Experts


Article
Where Is Cloud Permissions Management Headed?
Cloud permissions management emerged as a standalone cloud security technology
but is quickly becoming part of a broader set of capabilities
November 03, 2021
Cloud permissions management emerged as a standalone cloud security technology
but is quickly becoming part of a broader set of capabilities

by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
November 03, 2021
5 min read

Omdia


Article
Identity-Focused Security Controls Prevail
How identity and access management strategies held up during the pandemic and
tips for putting together an identity security road map.
October 27, 2021
How identity and access management strategies held up during the pandemic and
tips for putting together an identity security road map.

by Clint Maples, CISO at Robert Half
October 27, 2021
4 min read

Operations


Article
SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat
Microsoft says the group has attacked more than 140 service providers and
compromised 14 of them between May and October of this year.
October 25, 2021
Microsoft says the group has attacked more than 140 service providers and
compromised 14 of them between May and October of this year.

by Jai Vijayan, Contributing Writer
October 25, 2021
6 min read

Attacks/Breaches


Article
'TodayZoo' Phishing Kit Cobbled Together From Other Malware
Microsoft's analysis of a recent phishing attack shows how cybercriminals are
mixing and matching to efficiently develop their attack frameworks.
October 22, 2021
Microsoft's analysis of a recent phishing attack shows how cybercriminals are
mixing and matching to efficiently develop their attack frameworks.

by Robert Lemos, Contributing Writer
October 22, 2021
5 min read

Threat Intelligence


Article
Removing Friction for the Enterprise With Trusted Access
Our work lives are supposed to be simpler and easier because of technology. At
least that’s the promise.
October 20, 2021
Our work lives are supposed to be simpler and easier because of technology. At
least that’s the promise.

by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
October 20, 2021
4 min read

Edge Articles


Article


DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept