Gartner Warns IAM Professionals Cyber Security Depends on Them

Australian identity access management professionals have been urged to entrench identity as a foundation of their organisations’ cyber security posture, as sub-par management of significant exposures, including machine identities, was…

Continue ReadingGartner Warns IAM Professionals Cyber Security Depends on Them

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub…

Continue ReadingEleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Google Cloud Study: Big Risk in Proliferating Credentials, Keys

Image: Bilalulker/Adobe Stock Credentials are the achilles heel in enterprise security, according to a new report from Google Cloud’s Cybersecurity Action Team, which found that credential vulnerabilities accounted for 60%…

Continue ReadingGoogle Cloud Study: Big Risk in Proliferating Credentials, Keys

Okta vs. Duo (2023): Which IAM tool is best for your business?

Identity and access management solutions like Okta and Duo are extremely valuable for maintaining organizational data security. While both Okta and Duo offer strong identity management features like multifactor authentication,…

Continue ReadingOkta vs. Duo (2023): Which IAM tool is best for your business?