Identity Management? Zero Trust? PIM? Succeed by getting the basics right.
Identity Defined Security Alliance
by Vaughn-Shane Camarda
1M ago
In today’s rapidly evolving online landscape, terms like zero trust, PIM (or Privileged Identity Management), and a series of other acronyms can leave the average person scratching their head. Amidst this jargon and the complex frameworks, it’s too easy to lose sight of the fundamental question at the core of identity management: “Who are you?”   By focusing on the basics, everyone can work together on bolstering identity management throughout our digital reality. Translating identity management Since almost every business and other organization has some digital footprint, knowing wh ..read more
Visit website
Estrategias de cumplimiento para soluciones de gestión de identidad basadas en blockchain.
Identity Defined Security Alliance
by Vaughn-Shane Camarda
4M ago
Introducción Una cadena de bloques (blockchain) es un sistema virtualmente distribuido que consiste en una serie de registros de datos inmutables con fecha y hora, con cada “bloque” de información almacenado en una amplia gama de redes informáticas. Cada vez se utiliza más en diversos ámbitos de la seguridad de la información, incluida la gestión de identidades. La gestión de identidades se refiere a todos los procesos y tecnologías que una organización utiliza para identificar, autenticar y autorizar a los usuarios a acceder a la información y los sistemas. Las soluciones de gestión de identi ..read more
Visit website
La amenaza oculta de la ciberseguridad en las organizaciones: Aplicaciones no federadas
Identity Defined Security Alliance
by Vaughn-Shane Camarda
4M ago
Descubriendo la verdad sobre las aplicaciones no federadas a través de una investigación independiente. De vez en cuando surge una nueva categoría de riesgo, normalmente impulsada por un acontecimiento decisivo. Pensemos en el ataque a la cadena de suministro de SolarWinds. En una investigación que anunciamos hoy con el Instituto Ponemon , hemos descubierto el próximo cisne negro de la ciberseguridad: las aplicaciones no federadas. Nuestra investigación indica que generan entre el 11% y el 15% de las brechas anualmente. ¿Qué son las aplicaciones no federadas? Definimos las aplicaciones como no ..read more
Visit website
Remediación de acceso privilegiado – (Privilege Access Remediation)
Identity Defined Security Alliance
by Vaughn-Shane Camarda
4M ago
Es necesario remediar el acceso privilegiado para abordar los hallazgos con el objetivo general de reducir el riesgo. El análisis de la causa raíz es fundamental en la corrección del acceso privilegiado.  Es preferible que exista un proceso automatizado para la remediación, sin embargo, no todas las empresas tienen procesos automatizados para realizar la remediación de acceso, ya sea debido a la madurez o el costo de las herramientas para automatizar. Ya sea automatizado o manual, el análisis de la causa raíz es fundamental para garantizar que el riesgo no se repita continuamente. Utiliza ..read more
Visit website
State Of Data Access Governance Report Shows Organizations Struggle with Data Security and Compliance
Identity Defined Security Alliance
by Vaughn-Shane Camarda
4M ago
When adequately secured, expertly analyzed, and appropriately shared, enterprise data is a business accelerant. But as more data is created and stored, the potential attack surface grows – and companies struggle to adequately secure their critical data assets – leaving them exposed to greater risk.   To help understand the current state of data access governance, SailPoint partnered with an external research firm to investigate how organizations are securing sensitive data assets and prioritizing risk across the organization. We heard from 300 security and IT professionals ..read more
Visit website
Ping Supports International Fraud Awareness Week
Identity Defined Security Alliance
by Vaughn-Shane Camarda
4M ago
November 12-18 is International Fraud Awareness Week. As one of the top enterprise identity providers, Ping Identity is dedicated to spreading the message of Fraud Awareness Week. Not only do we provide top identity fraud protection solutions, but we also promote identity fraud protection best practices among customers and peers. Ping is constantly monitoring the global landscape for trends and insights in the identity security space. In doing so, we are reminded time and again that account takeover (ATO) and new account fraud (NAF) are significant problems for any organization doing business ..read more
Visit website
Top Cybersecurity Trend Predictions for 2024: BeyondTrust Edition
Identity Defined Security Alliance
by Vaughn Camarda
5M ago
..read more
Visit website
SailPoint: How identity security can be a business accelerator.
Identity Defined Security Alliance
by Vaughn Camarda
6M ago
This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration in a trend that we saw percolating within the enterprise for the last handful of years: digital transformation.    Now, digital acceleration is great for businesses worldwide. It allows for anywhere, anytime work ..read more
Visit website
DEFEND Your Data with Privileged Identity Management
Identity Defined Security Alliance
by Vaughn-Shane Camarda
6M ago
Best Practices and Lessons Learned A privileged user is defined as “A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform”1 (NIST SP 800-172).  These roles are typically called a ‘root user’ or ‘superuser’ and these roles are defined the same as ‘privileged user’.  Privileged users have access to systems at an elevated level and these accounts ‘sell’ for a bigger price tag on the Dark Web for a reason: because they allow attackers to infiltrate critical systems directly and quickly.2 If an attacker ..read more
Visit website
Compliance Strategies for Blockchain-Based Identity Management Solutions
Identity Defined Security Alliance
by Vaughn Camarda
6M ago
Introduction A blockchain is a virtually distributed system consisting of a series of time-stamped, immutable data records with each “block” of information stored across a wide range of computer networks. It is increasingly being utilized in various information security spaces including identity management. Identity management refers to all the processes and technologies an organization uses to identify, authenticate, and authorize users to access information and systems. Blockchain identity management solutions when implemented help facilitate compliance initiatives by offering a secure way f ..read more
Visit website

Follow Identity Defined Security Alliance on FeedSpot

Continue with Google
Continue with Apple
OR