Identity attack vectors extend the surface area for cyber attacks beyond the open ports, database vulnerabilities, and insecure protocols that malicious intruders often seek to exploit. The purpose of identity attacks is to compromise identities on a network and impersonate that identity for a nefarious purpose. This article describes identity attack vectors by focusing on the methods and tactics used to take over compromised identities on a corporate network.Read More
Whether you’re talking about devices or users, identity is the common factor that enables or weakens an organization’s information security posture. Proper identity and access management:
This article describes how identity functions as the new network perimeter within the modern corporate network infrastructure.Read More
There are only two times that all the people in your organization have the right level of access to the data, applications, and systems in your company—before they join the company and just after an audit. In between audits, inefficient identity and access management can increase the likelihood of having orphaned accounts. This article informs you about orphaned accounts and their dangers.
This year conferences went virtual and while this meant that we could attend events without pants, it also means not bumping into old friends and sharing ideas over a meal. This year Identiverse is a hybrid event with an in-person and a virtual component.Read More
The Tuebora team had a great week at Identiverse hosted in beautiful downtown Boston, MA. Although Samuel Adams failed to show up in person, that did not dissuade many other IAM professionals from around the world from coming out. There was a lot to see and hear this year in terms of content from a variety of speakers and a great sampling of vendors from the IAM industry present on the show floor.Read More