Tag: identity
-
Are your company’s NHIs meticulously managed
Is Your Organization Overlooking the Nuances of Non-Human Identity Management? Spotlighting the Intricacies of Non-Human Identity Management How often does your security team delve into the complexities of Non-Human Identity (NHI) management? When organizations increasingly shift operations to the cloud, managing these machine identities becomes crucial for maintaining robust security. But what exactly are NHIs,……
-
How Dell Is Building the Secure Agentic Enterprise
Dell’s AI Blueprint for Identity, Agents and Agentic Infrastructure. Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company’s evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and…
-
How Dell Is Building the Secure Agentic Enterprise
Dell’s AI Blueprint for Identity, Agents and Agentic Infrastructure. Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company’s evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and…
-
How World ID wants to put a unique human identity on every AI agent
Iris-scan backed tokens could help stop agent swarms from overwhelming online systems. First seen on arstechnica.com Jump to article: arstechnica.com/ai/2026/03/world-id-wants-you-to-put-a-cryptographically-unique-human-identity-behind-your-ai-agents/
-
Ransomware’s Opening Play: Target Identity First
Ransomware attackers now target identity systems like Active Directory first. Learn how identity resilience can help you prevent and recover from attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ransomware-resilience/
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Top 5 Things CISOs Need to Do Today to Secure AI Agents
AI agents are autonomous actors with real access to data and systems, not just copilots. Token Security explains why identity-based access control is critical to prevent misuse and data exposure. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/top-5-things-cisos-need-to-do-today-to-secure-ai-agents/
-
Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents
New York, United States, March 17th, 2026, CyberNewswire Unleash AI adoption securely: discover, attribute, and govern AI agents throughout the enterprise Orchid Security, the company bringing clarity and control to the complexity of enterprise identity, today announced it has been recognized as a Representative Vendor in Gartner’s Market Guide for Guardian Agents, as a vendor…
-
Identity Management for Multi-Tenant SaaS Applications
Learn how to implement identity management for multi-tenant SaaS applications with secure authentication, tenant isolation, and access control. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/identity-management-for-multi-tenant-saas-applications/
-
ITStrategie: Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Inside Nevada’s Push for Secure Digital Government
Tags: ai, attack, cio, cybersecurity, data-breach, governance, government, identity, ransomware, resilienceState CIO Tim Galluzi on Identity Modernization, AI and Resident Services. The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/inside-nevadas-push-for-secure-digital-government-a-31037
-
Decentralized Identity and Verifiable Credentials: The Enterprise Playbook 2026
The decentralized identity market hits $7.4B in 2026. Every EU member state must deploy a digital identity wallet by year-end. This enterprise playbook covers how verifiable credentials, DIDs, ZKPs, and the EUDI Wallet work, and how to build a practical adoption roadmap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/decentralized-identity-and-verifiable-credentials-the-enterprise-playbook-2026/
-
Why Enterprise Resource Planning Access Gaps Fuel Fraud Risk
Pathlock’s Jason Gzym on ERP Platforms, Observability and Fraud Exposure. Organizations believe their identity governance programs cover critical business systems. Jason Gzym, vice president of sales engineering and advisory at Pathlock, says ERP platforms remain a blind spot because teams lack granular visibility into access, activity and risky entitlement combinations. First seen on govinfosecurity.com Jump…
-
What security leaders need to know about zero trust identity management in 2026
The evolution of cybersecurity challenges and the rapid pace of digital transformation have led security leaders to focus increasingly on robust and adaptive security frameworks. Among them, zero trust identity management has emerged as a cornerstone of modern security strategies. As we look toward 2026, this article provides a detailed roadmap for security leaders to…The…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
Don’t confuse asset inventory with exposure management
Tags: access, ai, api, attack, breach, business, chatgpt, cloud, compliance, control, credentials, cyber, cybersecurity, data, data-breach, detection, endpoint, flaw, framework, governance, government, identity, infrastructure, intelligence, Internet, leak, least-privilege, metric, mfa, monitoring, network, regulation, risk, saas, service, software, threat, tool, update, vulnerability, vulnerability-managementAsset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don’t have exposure management. You have inventory. Key takeaways True exposure management requires more than asset inventory. It’s about merging…
-
»Eine ITStrategie für komplexe Landschaften zu entwickeln, sollte zu Jahresbeginn ganz oben auf der Agenda stehen« Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Identitätsmanagement und KI-Sicherheit – Okta erweitert Identity Security Posture Management um Agent Discovery
First seen on security-insider.de Jump to article: www.security-insider.de/okta-erweitert-identity-security-posture-management-um-agent-discovery-a-6a86d5ebbb8c0fa1238db1d3a8e52ee5/
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…

