
3 Lessons Learned from Attacks on Okta Super Admins
Discover the latest Okta security incident, learn about identity federation abuse, and find out how to protect your Okta environment. Explore the risks and solutions.
Discover the latest Okta security incident, learn about identity federation abuse, and find out how to protect your Okta environment. Explore the risks and solutions.
Security leaders discuss the challenges and priorities for identity and access security in 2023, including the transition to the cloud, the need for visibility and control over identities…
Earlier this month, the team over at security firm Kroll released its “Q3 Threat Landscape: Insider Threat the Trojan Horse of 2022” report on the rise in insider threat…
Authomize announced today that we are the Identity Threat Detection and Response (ITDR) Platform. If you missed our Press Release on the announcement, take a moment to check it out…
In response to the expanding threat surface facing identities, interoperability between identity and access management (IAM) and security operations is now understood to be a must for organizations in defending their cloud environments…
Following the new Gartner research report around Identity Threat Detection and Response (ITDR) we suggest 3 steps that help organizations get started with protecting their IAM layer from identity threats.
Attackers are going after third-party contractors, using their legitimate access to the targets and exploiting security gaps to break in and make off with their ill-gotten goods. But what is it about the way that organizations manage and interact with contractors that makes these third-party players such a risk?
In January, Twitter confused the security world by firing their head of security Peiter Zatko — or as he is more commonly known in security circles, Mudge. The severing of ties came without much of an explanation. Until recently.
Rideshare giant Uber found themselves in the headlines yet again last week when news leaked out that they had been hacked. This is not the first time for the company finding themselves in the headlines for being hacked or controversy. Based on reporting — much of it coming from the claims of the person […]
We here at Authomize have released an updated Access Explorer that gives security teams the highly detailed view of access to their assets that makes it easy to investigate and resolve incidents.
Access Review campaigns don’t have to be drawn out and complicated. Deployed and configured in just a few hours, Authomize’s centralized platform will make sure you’re ready for your next…
The hacking of SolarWinds continues to reverberate, serving as a wakeup call for organizations to take stronger steps to secure identity and access when it comes to their software supply chains.
The Verizon Data Breach Investigations Report is essentially infosec’s report card.
Amazon Web Services (AWS) provides the backbone infrastructure for many organizations, making it a vital resource that needs to be protected. Sprawling across a wide range of apps and services, AWS is home to large swathes of an organization’s data and operations.
For the better part of the past ten years, organizations have been speaking about how moving their business to the cloud was a core part of their roadmap.
According to reports, authentication and Identity and Access Management (IAM) solutions provider Okta was breached by the Lapsus$ hacking group…
Being the subject of any data leak can leave you feeling a little bit naked, having your private information exposed for all to see.
Online streaming platform Twitch was hacked last week and the memes were fantastic. In case you missed it, a hacker reportedly stole 125 GB of valuable data from the Amazon-owned streaming service.
The crew over at the Open Web Application Security Project (OWASP) has come out with a surprising winner for their OWASP Top 10 list of web application security…
Identity is at the center of how we approach protecting our cloud assets, making it essential to confirm that each identity…
In the AWS environment, permissions to access your organization’s resources are tied to your identity. This makes your identity incredibly valuable, your keys to the kingdom as it were.
As security breaches become a bigger reality, it is crucial that cloud protectors consider the importance of safeguarding their information and strengthening their Identity and Access Management, all while recognizing the top security risks that have risen to the surface
Nothing is ever truly unhackable. Saying otherwise is asking for trouble. The question is when a breach occurs, how do we plan for our systems to fail gracefully increase our…
This has been a year that calls for breaking with complacency and taking steps to define and protect the assets that are most critical to our organizations To say that 2020 has been a year of change would…
A lot of (digital) ink has been spilled about how the cloud is going to change the way that we work — and for once, the marketers have really undersold how big the impact is…
Learn how Authomize's solution is changing the way companies are managing authorizations
Download