What We Are Reading
Article

Okta’s Cinderella Story

Okta can still be a Cinderella story. If they can get their own security right, history will look back on this as the low point before a happy ending.

Article

UNECA identifies 11 priorities for digital ID use in Nigerian state

The blueprint highlights key areas digital identity can deliver high value for the development efforts of Nigeria’s Northern state of Kaduna.       

Article

Recent SEC Action Is A Wake-Up Call For Digital Identity Protection

As industry leaders, it’s our responsibility to take note, learn and proactively shape the future of cybersecurity.                                 

Article

The 3 Cloud Security Innovations Paving the Way Forward

In a dynamic tech landscape where security and innovation intersect, insights from industry experts like Jim Reavis are invaluable in uncovering the evolving trends and challenges within cybersecurity.

Article

The hidden challenges of contractor identity management

Contractors are a major identity and access management (IAM) blindspot. While absolutely essential to business operations for many enterprises, employing these third parties still introduces a great deal of risk.

Article

Warning As 1Password, DashLane, LastPass And 3 Others Leak Passwords

Six of the most popular password managers have been called out by security researchers who uncovered a major vulnerability that impacts the Android autofill function.

Article

Microsoft DHCP could be leveraged for Active Directory DNS spoofing

SiliconAngle reports that threat actors could exploit Microsoft's Dynamic Host Configuration Protocol DNS Dynamic Updates functionality to facilitate the spoofing of Active Directory DNS records without additional user authentication.