Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Top Ten Tips to Lower Your Cyber Insurance Costs

As cyber-attacks become more sophisticated and frequent, businesses are turning to cyber insurance policies as a means of protection. Increasingly, CISO’s and Board of Directors are eager to take advantage of “risk transference” as part of a holistic cyber risk management strategy. However, the cost of such policies can often be a significant concern for organizations.

The risks of not implementing Privileged Access Management in your organization

Privileged Access Management (PAM) is a critical aspect of cybersecurity that helps organizations protect their sensitive data from unauthorized access. By controlling and monitoring access to privileged accounts, PAM solutions can prevent cyberattacks, data breaches and compliance violations. However, some organizations fail to implement PAM, leaving themselves vulnerable to various risks.

Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations

Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently in silos, and efforts to integrate them to work together can be patchwork at best.

Staying ahead of Privileged Access Management security risks: Success strategies

Privileged accounts are the root of most threat vectors. So, it’s critical to take proper precautions to prevent catastrophic breaches. However, it often takes extra time and effort to fully recognize and mitigate Privileged Access Management security risks that put your organization at risk.

The hazards of not using just-in-time (JIT) privileged access in Active Directory

Active Directory (AD) is the foundation of managing identities, provisioning users and issuing permissions to network resources. These permissions range from the lowest levels of access to the highest levels of admin rights for privileged users. While having control over these permission levels is useful, organizations can open themselves up to serious vulnerabilities if they don’t manage the permission levels carefully.

OneLogin and AWS CloudTrail Lake Integration

As an AWS Partner, One Identity is proud to announce that it is now even easier to leverage your existing AWS tooling with your OneLogin data. We are among the first partners to offer a new integration that joins tools, such as our previously released AWS EventBridge webhook. Now, AWS and One Identity have teamed to deliver an integration with AWS CloudTrail Lake, which allows you to store your OneLogin event data in AWS along with all your other data.

Eliminate compromised passwords with One Identity Password Manager & Have I Been Pwned

It's a good question, and if you're curious about whether any of your email addresses or passwords were included in a data breach, you can easily find out at HaveIBeenPwned.com. This entirely free service, managed by Microsoft Regional Director & MVP Troy Hunt, lets you enter an email address or password to see how many breaches it has been included in.

Automation in Identity and Access Management and what it means for businesses

As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to work on more important tasks, and reduce the friction required in managing team member and vendor access across necessary accounts, data and applications.