Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The future of AI in Identity Security, with Martin Kuppinger and One Identity CEO Praerit Garg

Join One Identity CEO Praerit Garg and KuppingerCole Founder and Principal Analyst Martin Kuppinger as they discuss the evolution of IAM and thefuture of AI in Identity Security.

What Professionals Look For When Checking for Infidelity

Infidelity is a painful topic that can shake the very foundations of a relationship. Whether it's a fleeting moment of weakness or a long-term betrayal, the repercussions are often far-reaching. Yet, what can couples do when they suspect their partner is being unfaithful? Professional investigators offer valuable insights into spotting signs of an unfaithful partner and can bring clarity to a harrowing situation.

Tips for Integrating Illuminated Marketing Features Seamlessly

In the crowded marketplace of today, grabbing consumer attention is more challenging than ever. However, illuminated marketing features have emerged as a game-changing solution that elevates visibility and enhances brand perception. These features not only attract the eye but also contribute to an engaging experience for potential customers. To effectively make use of these luminous innovations, businesses must consider how to integrate them seamlessly into their existing marketing strategies.

Data Leakage: AI's Plumbing Problem

Sensitive information disclosure ranks on the OWASP Top 10 for LLM Applications, and for good reason. When AI-powered applications inadvertently expose private data like personally identifiable information (PII), financial records, health information, API keys, or proprietary business intelligence, the consequences cascade quickly: regulatory violations, competitive disadvantage, and shattered user trust.

The problem? The people you're blocking are often top performers.

Banning AI seems logical. Our new report shows why it's failing. The problem? The people you're blocking are often top performers. They're confident, innovative, and willing to work around the rules to get value. This video explains why this paradox changes everything. You can't just block curiosity. You have to harness it. Download the complete (ungated) report.

Adversarial AI: The New Symmetric Threat Landscape

Adversarial AI is geometrically making cyber a symmetric threat, fundamentally altering the cybersecurity equation. However, there are leaders who have successfully navigated these emerging challenges and understand the implications. Join Dr. Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Dr. Srinivas Mukkamala (CEO, Securin Inc.) as they dive into: SecurityScorecard monitors and scores over 12 million companies worldwide.

PII Detection in Unstructured Text: Why Regex Fails (And What Works)

Let’s look at something many teams quietly struggle with. Detecting PII inside unstructured text. It feels like it should be simple. After all, we’ve used regular expressions for years to find emails, phone numbers, and ID formats. Yet when we deploy regex in real environments. ticket systems, chat logs, CRM notes, uploaded documents, support transcripts. something becomes clear very quickly. Regex isn’t enough.

AI-Native Browsers Demand AI-Native Security: Why Legacy DLP Can't Protect You

In our recent analysis of AI browser exfiltration risks, we exposed how OpenAI's Atlas and Perplexity's Comet create permanent backdoors to sensitive data through persistent memory, autonomous agents, and cross-platform sync. The challenges with AI native browsers strongly resonated with CISO’s and security leaders we speak with on a daily basis. But the threat extends far beyond Atlas and Comet.