Tag: identity
-
The 20 Coolest Identity, Access And Data Security Companies Of 2026: The Security 100
CRN’s Security 100 list of the coolest identity, access and data security companies includes vendors in segments such as identity and access management, security service edge and AI-powered data security. First seen on crn.com Jump to article: www.crn.com/news/security/2026/the-20-coolest-identity-access-and-data-security-companies-of-2026-the-security-100
-
Top 5 Learnings from the 2026 Identity Breach Report
The 2026 Identity Breach Report marks a definitive shift in the cyber threat landscape, transitioning from simple data collection to what can only be described as the Industrialization of Identity. As adversaries adopt machine-scale automation, they are no longer just “leaking” data”, they are running high-velocity pipelines designed to weaponize human identities at an unprecedented scale.…
-
Cybersecurity Excellence Awards Reveal Nomination Shift from AI Hype to Governance Execution
Washington DC, USA, February 17th, 2026, CyberNewswire The Cybersecurity Excellence Awards today published early nomination insights from the 2026 program, highlighting a shift in vendor emphasis from broad AI positioning toward governance frameworks, identity architecture, and measurable accountability. Produced by Cybersecurity Insiders, the analysis draws on more than 200 submissions received ahead of RSA Conference…
-
Unit 42: Nearly two-thirds of breaches now start with identity abuse
Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor security controls stretch across a widening mosaic of integrated tools and systems. First seen on cyberscoop.com Jump to article: cyberscoop.com/attackers-abuse-identity-unit42-palo-alto-networks-incident-response-report/
-
With CISOs stretched thin, re-envisioning enterprise risk may be the only fix
Tags: access, ai, application-security, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, fraud, governance, grc, group, identity, infrastructure, jobs, monitoring, privacy, RedTeam, risk, soc, supply-chain, vulnerabilityStructural changes necessary: Flavio Villanustre, CISO for the LexisNexis Risk Solutions Group, says many organizations have already made the structural changes necessary to address the rising importance, and specialization, of cybersecurity and risk functions.”The breadth and depth of information security and cybersecurity have increased so significantly over the past two decades that it drove a…
-
Advancements in Passkey Authentication in Europe
Explore how passkey authentication is revolutionizing security in Europe through FIDO2 standards, NIS2 compliance, and the European Digital Identity Wallet. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/advancements-in-passkey-authentication-in-europe/
-
How SSO Simplifies Identity Management for Deskless and Frontline Workforces
Discover how SSO streamlines identity management for deskless and frontline workers, improving security, access control, and productivity. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/how-sso-simplifies-identity-management-for-deskless-and-frontline-workforces/
-
PIM Login Security
Learn how PIM login security protects product data with strong authentication, access controls, and secure identity management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/pim-login-security/
-
How assured is identity security with the adoption of NHIs?
How Does Non-Human Identity Management Enhance Identity Security Assurance? How can organizations bolster their identity security assurance amidst the growing complexity of cloud environments and the proliferation of machine identities? The answer lies in adopting Non-Human Identities (NHIs). This approach is increasingly crucial for diverse industries, providing a comprehensive solution to the security challenges posed……
-
What proactive measures can be taken for NHI lifecycle management?
How Can We Streamline NHI Lifecycle Management for Better Cloud Security? What if you could seamlessly integrate non-human identity management into your cybersecurity strategy to bolster cloud security across your organization? With digital transforms rapidly, the importance of proactive NHI lifecycle management becomes ever more crucial. Let’s explore how organizations can optimize NHI lifecycle management……
-
Identity Risk Scoring Only Works If Attribution Is Defensible
Identity risk scoring has become a critical input for fraud prevention, security operations, and trust decisions. Organizations increasingly rely on risk scores to decide when to step up authentication, block access, or flag activity for investigation. But despite widespread adoption, many identity risk programs struggle with the same problem: Risk scores are generated, but teams……
-
Survey: Most Security Incidents Involve Identity Attacks
A survey of 512 cybersecurity professionals finds 76% report that over half (54%) of the security incidents that occurred in the past 12 months involved some issue relating to identity management. Conducted by Permiso Security, a provider of an identity security platform, the survey also finds 95% are either very confident (52%) or somewhat confident..…
-
2026 Predictions: AI Is Breaking Identity, Data Security
Agentic AI Is Reshaping Security Faster Than Traditional Defenses Can Keep Up Agentic artificial intelligence is fundamentally altering organizational workflows and how risk materializes. In 2026, emerging cybersecurity trends will push organizations to move from deterministic, rule-based risk models toward adaptive models built for autonomous, non-deterministic systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/2026-predictions-ai-breaking-identity-data-security-p-4042
-
What is a SAML Assertion in Single Sign-On?
Learn what a SAML assertion is in Single Sign-On. Discover how these XML trust tokens securely exchange identity data between IdPs and Service Providers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/what-is-a-saml-assertion-in-single-sign-on/
-
Post”‘Quantum Authentication: How Consumer Apps Can Stay Secure in a Quantum”‘Ready World?
Post-quantum authentication helps consumer apps stay secure against quantum computing threats with future-proof encryption and identity protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/post%e2%80%91quantum-authentication-how-consumer-apps-can-stay-secure-in-a-quantum%e2%80%91ready-world/
-
Post”‘Quantum Authentication: How Consumer Apps Can Stay Secure in a Quantum”‘Ready World?
Post-quantum authentication helps consumer apps stay secure against quantum computing threats with future-proof encryption and identity protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/post%e2%80%91quantum-authentication-how-consumer-apps-can-stay-secure-in-a-quantum%e2%80%91ready-world/
-
Why Every Enterprise Needs a Strong Identity and Access Management Framework
Most enterprises still run identity and access on spreadsheets, tickets, and organizational knowledge”, until a breach or audit exposes a harder truth: no one can clearly explain who can do what in their most critical systems, or why. If you still treat Identity and Access Management (IAM) as IT plumbing rather than your primary control…
-
5 key trends reshaping the SIEM market
Tags: ai, api, attack, automation, business, cloud, compliance, crowdstrike, cyber, cybersecurity, data, detection, edr, google, guide, Hardware, ibm, identity, incident response, intelligence, jobs, monitoring, msp, network, nis-2, saas, service, siem, soar, startup, technology, threat, tool, vulnerability, vulnerability-managementMarket split as midrange sales offset SME slump: A year on, Context’s data shows that this ongoing convergence of SIEM with security tools such as XDR and SOAR has triggered a structural split in the market.”Large midmarket firms are doubling down on unified platforms for compliance, while smaller organizations are investing less in SIEM entirely…
-
Examples of SAML Providers
Explore top examples of SAML providers like Okta, Azure AD, and Ping Identity. Learn how to implement SAML SSO for secure enterprise identity management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/examples-of-saml-providers/
-
Securing Agentic AI Connectivity
Securing Agentic AI Connectivity AI agents are no longer theoretical, they are here, powerful, and being connected to business systems in ways that introduce cybersecurity risks! They’re calling APIs, invoking MCPs, reasoning across systems, and acting autonomously in production environments, right now. And here’s the problem nobody has solved: identity and access controls tell you…
-
Why identity recovery is now central to cyber resilience
Tags: access, ai, authentication, backup, business, cloud, compliance, cyber, data, email, identity, infrastructure, least-privilege, radius, ransomware, resilience, risk, service, strategyIdentity resilience: Implement immutable backups and automated recovery for identity systems such as Active Directory.Zero-trust architecture: Apply least-privilege access and continuous authentication to reduce the blast radius of an attack.Automated orchestration: Limit manual steps in recovery workflows so teams can respond faster under pressure.Regulatory readiness: Make audit-ready reporting and compliance validation part of resilience planning, not an afterthought.AI-ready protection: Account…
-
SpecterOps Launches BloodHound Scentry to Accelerate the Practice of Identity Attack Path Management
Drawing on years of adversary tradecraft, SpecterOps experts work alongside customers to analyze and eliminate attack paths, protect critical assets, and stay ahead of emerging threats. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/specterops-launches-bloodhound-scentry
-
The Agentic Virus: How AI Agents Become Self-Spreading Malware
In my previous post, I walked through how disconnected MCP servers and AI agents create a growing blind spot in enterprise identity. The problem: thousands of MCP deployments running with overly broad tokens, no authentication, and no connection to your identity fabric. The solution: federate everything through the Maverics AI Identity Gateway. That post assumed……
-
ServiceNow Prevents Deepfake Impersonation at the IT Service Desk with Nametag Identity Verification
First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/servicenow-prevents-deepfake-impersonation-at-the-it-service-desk-with-nametag-identity-verification/
-
Constella Intelligence Unveils 2026 Identity Breach Report: The Industrialization of Identity
New research reveals a 1-trillion-attribute threat landscape driven by machine speed and scale, and high-density credential consolidation. LOS ALTOS, CA, February 12, 2026 “, Constella, the leader in Identity Risk Intelligence, today announced the release of its flagship 2026 Identity Breach Report. The report details a fundamental shift in the cyber threat landscape, moving from the… First…
-
Reducing Alert Fatigue Using AI: From Overwhelmed SOCs to Autonomous Precision
How Artificial Intelligence Transforms Security Operations Security Operations Centers (SOCs) face a growing operational challenge: overwhelming alert volumes. Modern enterprise environments generate thousands of security notifications daily across endpoint, network, identity, cloud, and application layers. This continuous stream of alerts creates what the industry describes as alert fatigue, a condition where analysts are overwhelmed by…
-
Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report
Tags: access, ai, api, attack, automation, business, cloud, container, cyber, cybersecurity, data, exploit, finance, flaw, gartner, governance, identity, intelligence, iot, leak, network, risk, service, technology, threat, tool, update, vulnerability“Tenable’s asset and attack surface coverage, its application of AI and its reputation for vulnerability assessment makes it the front-runner in AI-powered exposure assessment,” Gartner writes in “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.” Key Takeaways from Tenable: This is the latest among a recent string of recognitions Tenable…
-
Omada Identity Governance Bericht zeigt Sicherheitsbedenken bei KI-Agenten
Die Studie verdeutlicht einen Paradigmenwechsel: Identity Governance hat sich längst von einer punktuellen Kontrollaufgabe zum Kernelement für den modernen IT-Betrieb entwickelt. Sie bildet das unverzichtbare Fundament für Zero Trust und KI-gestützte Prozesse in Unternehmen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/omada-identity-governance-bericht-zeigt-sicherheitsbedenken-bei-ki-agenten/a43705/

