CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Identity and Access Management
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Identity and Access Management

Businessman using finger on phone showing identity and access management
Cyber SecurityInsights

Breaking Point: Why Businesses Need Identity Systems Amid Rising Attacks

January 10, 2024
As we step into 2024, the IAM landscape continues to evolve. Decentralized identity, identity data engineering, and the integration of analytics and generative AI stand as pivotal pillars that will shape the success of IAM strategies in the coming year.
Read More
Cyber SecurityInsights

Five Questions to Ask About Your Employee Offboarding Process

July 26, 2023
Recent research shows that one third of enterprises lose more than 10% of their associated technology assets when offboarding workers, and 42% experience unauthorized access to SaaS applications and cloud resources.
Read More
Virtual lock on laptop showing access governance and access management
Cyber SecurityInsights

Organizations Need More Than Workflow-Based Access Governance to Keep Organizations Safe

July 25, 2023
In today’s corporate environment, everyone has become a privileged user accustomed to quick access and swift responses generated in seconds across platforms, vendors, and many different systems. A rigid and rule-bound access management system is no longer sufficient for companies that want to maintain a competitive edge.
Read More
Hand on keyboard with virtual login screen showing identity and access management
Cyber SecurityNews

CISA/NSA Identity and Access Management Guidelines Provide Cybersecurity Guidance for Administrators

March 29, 2023
CISA and the NSA note that identity and access management vulnerabilities are a particular recent focus for certain state-backed threat groups, and that 40% of data breaches not involving user error or an insider are now facilitated by stolen credentials.
Read More
Close up of hands using laptop keyboard with abstract glowing cloud showing identity and access management in hybrid cloud
Cyber SecurityInsights

Keeping Track of Identity in the Dynamic World of the Hybrid Cloud

April 25, 2022
A hybrid cloud environment is the reality for most organizations. Unfortunately, this set up can quickly create issues around both accessibility and security due to the challenges in managing identity across vastly different systems.
Read More
Virtual shields around the globe showing zero trust architecture and identity and access management
Cyber SecurityInsights

Back to School: An Introduction to Zero Trust Architecture and Identity and Access Management

October 28, 2021
Zero Trust architecture (ZTA) has quickly become one of the hottest new trends in enterprise cyber security. What are the benefits? What role does digital identity and access management play in the Zero Trust model?
Read More
- Advertisement -
- Advertisement -

Latest

Hacker hands using laptop showing car sharing platform data breach

Car Sharing Platform Zoomcar Hit by a Massive Data Breach, Impacting Approximately 8.4 Million People

Meta logo on device screen showing Meta AI

Meta AI Adds Warning That All Prompts, Including Those With Personal Information, Could be Made Public

Hacker working on keyboard showing cyber attack on whole foods distributor

Amazon’s Whole Foods Distributor United Natural Foods Hit by a Cyber Attack that Disrupted Operations

The White House in Washington DC showing cybersecurity executive order

New Cybersecurity Executive Order Takes on Election Interference Sanctions, Encryption Standards and Disinformation Programs

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results