Tag: identity
-
Enterprise SSO User Provisioning
Learn how enterprise SSO user provisioning automates access, improves security, and simplifies identity management across multiple applications. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/enterprise-sso-user-provisioning/
-
UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses
The Unique Identification Authority of India (UIDAI) has officially launched its first structured bug bounty program to fortify the Aadhaar system. As the foundation of a massive national identity database, securing Aadhaar requires continuous innovation and rigorous testing. This new initiative invites top cybersecurity experts to proactively identify and responsibly disclose potential vulnerabilities within UIDAI’s…
-
Adaptability, Not Novelty: The Next Evolution of Malware
AI-enabled malware like VoidLink adapts to cloud misconfigurations in real time, showing how attackers exploit identity sprawl and configuration drift. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/adaptability-not-novelty-the-next-evolution-of-malware/
-
Can you prove the person on the other side is real?
Tags: access, ai, business, control, credentials, exploit, governance, identity, least-privilege, risk, threat, tool, updateExploiting the deceased and the dormant: Attackers follow leverage. Dormant, legacy and deceased identities create leverage because they already come with history, which serves as scaffolding for a synthetic persona to climb.I have seen how quickly a subdued record can become an entry point. An adversary pairs an older account or identity footprint with newly…
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…
-
News alert: Orchid Security brings Zero-Trust to AI Agent identities, earns Gartner recognition
NEW YORK, Mar. 17, 2026, CyberNewswire”, Orchid Security, the company bringing clarity and control to the complexity of enterprise identity, today announced it has been recognized as a Representative Vendor in Gartner’s Market Guide for Guardian Agents,… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/news-alert-orchid-security-brings-zero-trust-to-ai-agent-identities-earns-gartner-recognition/
-
Lattice-Based Identity and Access Management for AI Agents
Secure your AI agents with lattice-based IAM. Learn how ML-KEM and ML-DSA protect Model Context Protocol (MCP) from quantum threats and puppet attacks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/lattice-based-identity-and-access-management-for-ai-agents/
-
Are your company’s NHIs meticulously managed
Is Your Organization Overlooking the Nuances of Non-Human Identity Management? Spotlighting the Intricacies of Non-Human Identity Management How often does your security team delve into the complexities of Non-Human Identity (NHI) management? When organizations increasingly shift operations to the cloud, managing these machine identities becomes crucial for maintaining robust security. But what exactly are NHIs,……
-
How Dell Is Building the Secure Agentic Enterprise
Dell’s AI Blueprint for Identity, Agents and Agentic Infrastructure. Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company’s evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and…
-
How Dell Is Building the Secure Agentic Enterprise
Dell’s AI Blueprint for Identity, Agents and Agentic Infrastructure. Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company’s evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and…
-
How World ID wants to put a unique human identity on every AI agent
Iris-scan backed tokens could help stop agent swarms from overwhelming online systems. First seen on arstechnica.com Jump to article: arstechnica.com/ai/2026/03/world-id-wants-you-to-put-a-cryptographically-unique-human-identity-behind-your-ai-agents/
-
Ransomware’s Opening Play: Target Identity First
Ransomware attackers now target identity systems like Active Directory first. Learn how identity resilience can help you prevent and recover from attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ransomware-resilience/
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its…
-
Top 5 Things CISOs Need to Do Today to Secure AI Agents
AI agents are autonomous actors with real access to data and systems, not just copilots. Token Security explains why identity-based access control is critical to prevent misuse and data exposure. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/top-5-things-cisos-need-to-do-today-to-secure-ai-agents/
-
Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents
New York, United States, March 17th, 2026, CyberNewswire Unleash AI adoption securely: discover, attribute, and govern AI agents throughout the enterprise Orchid Security, the company bringing clarity and control to the complexity of enterprise identity, today announced it has been recognized as a Representative Vendor in Gartner’s Market Guide for Guardian Agents, as a vendor…
-
Identity Management for Multi-Tenant SaaS Applications
Learn how to implement identity management for multi-tenant SaaS applications with secure authentication, tenant isolation, and access control. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/identity-management-for-multi-tenant-saas-applications/
-
ITStrategie: Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Inside Nevada’s Push for Secure Digital Government
Tags: ai, attack, cio, cybersecurity, data-breach, governance, government, identity, ransomware, resilienceState CIO Tim Galluzi on Identity Modernization, AI and Resident Services. The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/inside-nevadas-push-for-secure-digital-government-a-31037
-
Decentralized Identity and Verifiable Credentials: The Enterprise Playbook 2026
The decentralized identity market hits $7.4B in 2026. Every EU member state must deploy a digital identity wallet by year-end. This enterprise playbook covers how verifiable credentials, DIDs, ZKPs, and the EUDI Wallet work, and how to build a practical adoption roadmap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/decentralized-identity-and-verifiable-credentials-the-enterprise-playbook-2026/

