May 2, 2023
Via: Computer WeeklyAlthough networks, systems, and cyber security have come on in leaps and bounds, the fundamental theories of access control and the recent addition of identity to it (IAM) hasn’t really moved on from the 60s and 70s. Things like mandatory, […]
April 10, 2023
Via: CSO OnlineManaging identities and their access permissions is becoming more complicated. Digital sprawl has led to an explosion in permissions across multicloud environments, and consistent oversight is lacking. As many as 99% of cloud permissions are going unused, and this represents […]
Deployment Models, Public Cloud
March 13, 2023
Via: Data Center KnowledgeWhat does Identity and Access Management (IAM) for/in IT departments have in common with the song “All I Want For Christmas Is You” in shopping centers in December? Well, both are an integral part of the experience and you only […]
Deployment Models, Public Cloud
January 4, 2023
Via: Data Center KnowledgeThe Achilles heel is when backups and workloads are under the control of the same identity and access management (IAM) solution. In other words: When attackers compromise the IAM solution, they can delete servers and traditional backups (Figure 1, left). […]
November 16, 2022
Via: CSO OnlineIdentity and access management (IAM) vendor ForgeRock said Tuesday that it’s set to start rolling out its new Identity Governance offering—a cloud-based security and governance product designed to provide one-stop shopping for organizations looking to solve access management issues. There […]
April 26, 2021
Via: Security IntelligenceIn many cases, one business unit sets up its own cloud-native identity and access management controls differently from another. One of your customers’ business units may need Red Hat, while another may need controls from a specific public cloud provider. […]
Deployment Models, Hybrid Cloud
April 1, 2021
Via: InformationWeekIT decision makers may hesitate or at least carefully consider consequences related to identity and access management (IAM) and the cloud. Recently released research conducted by Forrester and commissioned by ForgeRock and Google Cloud points to numerous organizations planning to […]
February 18, 2021
Via: Security IntelligenceStarting off on the right foot in digital defense today means having good Cloud Security Posture Management (CSPM). Although it can be challenging to adopt, this set of strategies and tools manages and orchestrates cloud security in ways other tactics […]
Deployment Models, Global Cloud, Public Cloud
February 15, 2021
Via: CSO OnlineTodd McKinnon founded Okta in 2009 on the outrageous notion that business user identity could be managed in the cloud. In an in-depth 2013 interview on InfoWorld, McKinnon, the former VP of engineering for Salesforce, argued that mass migration to […]
December 11, 2020
Via: Computer WeeklyCloud technologies have played a vital role in businesses across all sectors during the Covid-19 coronavirus pandemic. Without them, firms would have struggled to enable their teams to work remotely and ultimately follow lockdown measures. Research from IT company Centrify […]
April 17, 2020
Via: InfoWorld Cloud ComputingThe first question most cloud security architects ask when tasked with designing a cloud security solution is: What cloud are you using? Then they typically select a set of technologies, such as IAM (identity and access management) and encryption, that […]
May 8, 2018
Via: InfoWorld Cloud ComputingA new report from McAfee highlights the skills gap when it comes to security in the cloud. The report reveals that one in four organizations using infrastructure as a service (IaaS) or software as a service (SaaS) have experienced cybersecurity […]