Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Strengthening security against cyber threats: Unveiling One Identity Cloud PAM Essentials

In a rapidly evolving cybersecurity landscape, organizations across all industries and sizes face an ever-growing array of sophisticated threats. Privileged accounts, in particular, have become prime targets for hackers, with nearly every major breach in recent years involving unauthorized access. Breaches caused by phishing and compromised credentials (the most common type of attack) cost an average of $4.76M and take almost 11 months to resolve.

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.

Unified Identity - look for the meaning behind the hype!

If you've listened to software vendors in the identity space lately, you will have noticed that "unified" has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits! However (there is always a however, right?) not every "unified" "identity" "security" "platform" is made equal.

SAP GRC (Governance, Risk Management and Compliance) Framework and Identity Manager

The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, they can minimize the time and cost of compliance with internal and external regulations. The SAP GRC framework comprises the SAP Access Control and SAP Cloud Identity Access Governance solutions.

Harnessing the Power of the Cloud: Understanding the Vital Role of Privileged Access Management

The cloud stands as a revolutionary force, redefining the way businesses operate, collaborate and innovate. Its scalability, flexibility and accessibility have transformed industries, offering a wealth of opportunities for organizations of all sizes. However, with these advancements come significant security concerns, particularly in managing access to sensitive data and critical systems.

Strengthening Cyber Defenses: The Crucial Role of PAM and IGA Solutions

We recently published a blog titled Defending Your Organization Against Session Cookie Replay Attacks. This blog thoroughly examined the menace of session cookie replay attacks, shedding light on the potential risks and consequences they pose to online security. The post delved into the intricacies of session cookie replay attacks, detailing their working mechanisms and the extensive damage they can inflict and emphasizing the imperative need to comprehend and fortify against such threats.

One Identity, AWS Directory Service Strengthen Partnership and Announce Active Roles Integration

One Identity announces significant expansion of their strategic partnership with the general availability of a seamless integration between One Identity Active Roles and AWS Directory Service. This collaboration strengthens security and enhances efficiency, and reinforces the principle of least privilege, offering customers best-in-class control over their Azure Active Directory and AWS Directory Service environments.

Defending Your Organization Against Session Cookie Replay Attacks

In the current cyber threat landscape, where online security is paramount, the threat of session cookie replay attacks looms large. These attacks sidestep the conventional need for credentials and aim to hijack your online sessions, potentially compromising sensitive data and taking over user accounts. This blog post delves into the intricacies of session cookie replay attacks, shedding light on what they are, how they work, and the potential consequences they can unleash.

One Identity Manager version 9.2 has been released GA

Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid or in the cloud. Now, identity security can be driven by business needs, not by IT capabilities. With Identity Manager, you can unify security policies and satisfy governance needs — today and long into the future.