Identity and Access Management

NIS2 Directive Enhances Identity and Access Control Standards
Identity and Access Management
NIS2 Directive Enhances Identity and Access Control Standards
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
Identity and Access Management
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
A cryptocurrency mining campaign targets AWS customers by exploiting stolen Identity and Access Management credentials. Detected by Amazon's GuardDuty, the attack uses novel persistence techniques ...
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
Identity and Access Management
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
Saviynt, a leading player in identity security, recently raised $700 million in funding led by KKR, enhancing its market valuation to $3 billion. The round ...
UK Government's Digital ID Plans Face Scrutiny Over Cost and Savings
Identity and Access Management
UK Government’s Digital ID Plans Face Scrutiny Over Cost and Savings
The UK's ambitious digital ID plans have sparked debate as the Office for Budget Responsibility (OBR) reveals an annual cost of £600 million. Despite a ...
Microsoft Alerts Users About FIDO2 Security Keys PIN Issue After Recent Windows Updates
Identity and Access Management
Microsoft Alerts Users About FIDO2 Security Keys PIN Issue After Recent Windows Updates
Recent Windows updates have led to unexpected PIN prompts for users utilizing FIDO2 security keys. Microsoft identifies the issue affecting user sign-in and provides a ...
How Device Code Phishing Abuses OAuth Flows on Google and Azure
Identity and Access Management
How Device Code Phishing Abuses OAuth Flows on Google and Azure
Cybercriminals are increasingly exploiting the OAuth 2.0 device code flow to bypass multi-factor authentication, a tactic known as device code phishing. Researchers warn that while ...
Keycard Emerges from Stealth $38M Funding Fuels IAM Innovation for AI Agents
Identity and Access Management
Keycard Emerges from Stealth: $38M Funding Fuels IAM Innovation for AI Agents
San Francisco startup Keycard has emerged from stealth with $38M in funding to launch an IAM platform built for AI agents. Designed to secure autonomous ...
Axonius Identities Review 2025 Unified IAM, Governance & Security
Identity and Access Management
Axonius Identities Review 2025: Unified IAM, Governance & Security
Axonius Identities delivers unified identity governance, lifecycle automation, and identity security posture for both human and non-human identities across complex enterprise environments, with actionable policy ...
Dark Web Monitoring Guide for CISOs Turning Shadows into Signals
Application Security
Dark Web Monitoring Guide for CISOs: Turning Shadows into Signals
Dark web monitoring gives CISOs early warning of breaches, ransomware, and credential leaks. Turning intelligence into action helps enterprises anticipate attacks instead of merely reacting.
Okta Raises FY26 Forecast as Identity Verification Demand Surges
Data Security
Okta Raises Annual Forecasts Amid Surging Demand for Cybersecurity Tools
Okta has lifted its fiscal 2026 revenue forecast after reporting strong Q2 results, driven by soaring demand for identity verification tools. As AI-powered impersonation attacks ...