Tag: identity
-
CyberArk Makes Identity Security Play With Zilla Acquisition
CyberArk announces the Zilla deal on the same day leading identity service provider SailPoint returns to the public markets. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/cyberark-makes-identity-security-play-zilla-acquisition
-
SailPoint IPO Signals Bright Spot for Cybersecurity
In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/sailpoint-ipo-signals-bright-spot-for-cybersecurity/
-
The Benefits of the M&A Frenzy in Fraud Solutions
Emerging Vendors, Consolidation Drive Innovation in Fraud, AML, Scam Prevention. As cybercriminals exploit AI-generated deepfake scams and synthetic identity fraud, financial institutions are investing heavily in fraud detection, anti-money laundering solutions and identity verification to stay ahead. This demand is driving consolidation in the market. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/benefits-ma-frenzy-in-fraud-solutions-a-27533
-
SailPoint’s Public Return Highlights SaaS Growth Strategy
President Matt Mills Shares M&A Vision, Machine Identity Security, Market Expansion. SailPoint returns to the public markets, and President Matt Mills discusses the company’s SaaS evolution and market expansion plans. He outlines how proceeds from the IPO will be used and highlights new tools for managing the growing risk from unmanaged machine identities. First seen…
-
Delinea Extends Scope of Identity Management Platform
Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the lifecycle of an identity from onboarding to offboarding. Additionally, administrators using the platform to manage access and privileges can now access it via..…
-
Palo Alto Networks PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)
Overview Recently, NSFOCUS CERT detected that Palo Alto Networks issued a security announcement and fixed the identity bypass vulnerability in PAN-OS (CVE-2025-0108). Due to the problem of path processing by Nginx/Apache in PAN-OS, unauthenticated attackers can bypass authentication to access the management web interface of PAN-OS device and call some PHP scripts, thus obtaining sensitive…The…
-
SGNL Raises $30 Million for Identity Management Solution
Tags: identityIdentity management provider SGNL has raised $30 million in a Series A funding round led by Brightmind Partners. The post SGNL Raises $30 Million for Identity Management Solution appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/sgnl-raises-30-million-for-identity-management-solution/
-
Die besten IAM-Tools
Tags: access, ai, api, authentication, automation, business, ciso, cloud, compliance, endpoint, gartner, governance, iam, identity, infrastructure, login, mfa, microsoft, okta, password, risk, saas, service, tool, windows, zero-trustIdentity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools.Identität wird zum neuen Perimeter: Unternehmen verlassen sich immer seltener auf die traditionelle Perimeter-Verteidigung und forcieren den Umstieg auf Zero-Trust-Umgebungen. Sicherer Zugriff und Identity Management bilden die Grundlage jeder Cybersicherheitsstrategie. Gleichzeitig sorgt die Art und Weise, wie sich…
-
SailPoint Completes IPO, Boosting Fundraise To $1.32B
Identity security firm SailPoint became the second cybersecurity vendor to go public since 2021 with the completion of its IPO Thursday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/sailpoint-completes-ipo-boosting-fundraise-to-1-32b
-
CyberArk Bolsters Identity Governance With $175M Zilla Buy
Acquisition of Startup Adds Modern Identity Governance to CyberArk’s Identity Suite. CyberArk has acquired Zilla Security for up to $175 million, adding modern identity governance and administration capabilities with AI-driven automation for faster deployments, streamlined access reviews, and efficient provisioning to secure human and machine identities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cyberark-bolsters-identity-governance-175m-zilla-buy-a-27513
-
CyberArk Acquires Identity Governance Startup Zilla Security For Up To $175M
CyberArk announced Thursday it has acquired identity governance startup Zilla Security for up to $175 million. First seen on crn.com Jump to article: www.crn.com/news/security/2025/cyberark-acquires-identity-governance-startup-zilla-security-for-175m
-
CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security
CyberArk acquires early stage Boston startup Zilla Security for $165M, expanding its identity security and IGA capabilities. The post CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cyberark-expands-identity-security-play-with-165m-acquisition-of-zilla-security/
-
CyberArk snaps up Zilla Security for up to $175M
Information security company CyberArk has acquired identity access and governance platform Zilla Security in a deal worth up to $175 million. Founded in 1999, Boston-based CyberArk specializes in access management, including privileged access security which helps organizations protect sensitive data and critical infrastructure from external (and internal) threats. CyberArk went public on the Nasdaq in…
-
Harnessing Powerful Tools for Identity Protection
Can We Truly Secure Our Digital Universe? More businesses are realizing the importance of boosting their cybersecurity measures. One such measure that has gained considerable attention due to its efficiency and effectiveness is Non-Human Identities (NHIs) and Secrets Security Management. But why is this strategy becoming an essential part of cybersecurity infrastructure? The Untapped Potential……
-
Innovations in Machine Identity Management
Are You Ready to Revolutionize Your Approach to Machine Identity Management? We understand the challenges you face in streamlining the complexities of managing Non-Human Identities (NHIs) and their secrets. These machine identities are the unsung heroes of your cyber ecosystem, silently powering your operations while shielding your valuable data assets from threats. What are Non-Human……
-
SaaS Security: Connecting Posture Management Identity Risk
SaaS security posture management and identity risk are deeply connected. Learn how to unify visibility, automation, and control to protect your SaaS ecosystem. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/saas-security-connecting-posture-management-identity-risk/
-
AI and Security – A New Puzzle to Figure Out
AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security First…
-
Grip SSPM: Next Evolution in SaaS Identity Risk Management
Grip SSPM enhances SaaS security by automating misconfiguration fixes, engaging app owners, and unifying risk management for a smarter, proactive defense. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/grip-sspm-next-evolution-in-saas-identity-risk-management/
-
SGNL snags $30M for a new take on ID security based on zero-standing privileges
Security experts often describe identity as the “new perimeter” in the world of security: in the world of cloud services where network assets and apps can range far and wide, the biggest vulnerabilities are often leaked and spoofed log-in credentials. A startup called SGNL has built a new approach that it believes is better at…
-
Nametag Adds Ability to Verify Identity of New Remote Workers
Tags: identityNametag extended its identity verification platform enabling organizations to verify the identity of a remote worker they are considering. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/nametag-adds-ability-to-verify-identity-of-new-remote-workers/
-
Enhancements for BloodHound v7.0 Provide Fresh User Experience and Attack Path Risk Optimizations
Tags: access, attack, ciso, computer, control, cybersecurity, data, group, identity, incident response, metric, radius, risk, risk-assessment, threat, tool, update, vulnerability, vulnerability-managementGeneral Availability of Improved Analysis Algorithm and Security Posture Management Improvements The BloodHound team previewed several concepts in the last couple of releases that made it easier for customers to visualize attack paths and show improvements in identity risk reduction over time. This week’s release of BloodHound v7.0 includes significant enhancements focused on improving user experience…
-
Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO
Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO As cyber threats continue to evolve, Identity and Access Management (IAM) is no longer just about authentication”, it’s about intelligent, adaptive security. AI-driven IAM solutions are reshaping how organizations manage identities, permissions, and…
-
WTF? Why the cybersecurity sector is overrun with acronyms
, a global online news organization. Let’s put it this way: Many academics, regardless of their area of expertise, have never met an acronym they didn’t prefer to typing out the entire phrase. That means our copyediting efforts too often involve spelling out or removing acronyms throughout, much to the chagrin of some of our…
-
6 Best Identity Access Management (IAM) Software Solutions in 2025
Find out which IAM software solution you should implement to securely connect your remote workforce to your organization’s resources. Learn more here. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/best-iam-software/
-
Hackers breach Microsoft IIS services using Cityworks RCE bug
Hackers are exploiting a high-severity remote code execution (RCE) flaw in Cityworks deployments, a GIS-centric asset and work order management software, to execute codes on a customers’ Microsoft web servers.In a coordinated advisory with the US Cybersecurity and Infrastructure Security Agency (CISA), Cityworks’ developer Trimble said that the vulnerability, tracked as CVE-2025-0994 with CVSS rating…
-
Don’t Overlook These 6 Critical Okta Security Configurations
Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture.With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for…
-
Achieving Independence with Robust IAM Systems
Why does robust IAM matter in our pursuit of independent cybersecurity? Coupled with the increased complexity of infrastructure and applications, has highlighted the need for advanced, independent cybersecurity measures. While traditional security methods remain essential, they often fall short in addressing the full scope. A critical component often overlooked in these strategies is Identity and……
-
Critical Cisco ISE bug can let attackers run commands as root
Cisco has fixed two critical Identity Services Engine (ISE) vulnerabilities that can let attackers with read-only admin privileges bypass authorization and run commands as root. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/critical-cisco-ise-bug-can-let-attackers-run-commands-as-root/
-
Cisco addressed two critical flaws in its Identity Services Engine (ISE)
Cisco addressed critical flaws in Identity Services Engine, preventing privilege escalation and system configuration changes. Cisco addressed multiple vulnerabilities, including two critical remote code execution flaws, tracked as CVE-2025-20124 (CVSS score of 9.9) and CVE-2025-20125 (CVSS score of 9.1), in Identity Services Engine (ISE). A remote attacker authenticated with read-only administrative privileges could exploit the…

