identity and access management (IAM)
Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout

Lacklustre leadership from DCMS delays UK-wide biometric identity platform rollout
For years the UK government has longed for a fully functional digital identity system, but it isn't helping those who are crying out to build it
2 Feb 2023
Thoma Bravo's $2.3bn ForgeRock acquisition brings 2022 cyber investment to $12bn

Thoma Bravo's $2.3bn ForgeRock acquisition brings 2022 cyber investment to $12bn
The firm will have spent big on three different digital identity access management companies in the last year, in addition to significant industry inv…
12 Oct 2022
SolarWinds hackers strike again with a new “MagicWeb” authentication exploit

SolarWinds hackers strike again with a new “MagicWeb” authentication exploit
Microsoft warns MagicWeb can abuse admin credentials to hijack AD FS enterprise identity system
26 Aug 2022
Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition

Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition
The intelligent identity company joins Proofpoint and Sophos, among others, as it looks to accelerate its cloud transformation
4 Aug 2022
Thales acquires OneWelcome to boost identity and data privacy management

Thales acquires OneWelcome to boost identity and data privacy management
The company is set to buy OneWelcome for €100 million (£84 million) and use its offerings to give users greater control of their data
12 Jul 2022
Cisco unveils new ‘intelligent’ approach to networking with brace of product launches

Cisco unveils new ‘intelligent’ approach to networking with brace of product launches
Cloud Management for Cisco Catalyst and Cisco Nexus both aim to bring deeper insights and ease the burden of IT teams
16 Jun 2022
CIAM buyer’s guide
CIAM buyer’s guide
Finding the right CIAM solution to capture & retain customers, fuel business growth and keep customers safe
6 Jun 2022
The hybrid work maturity framework
The hybrid work maturity framework
Your roadmap to trusted flexible working
6 Jun 2022
What is identity management?

What is identity management?
Make sure only the right people have access to your infrastructure
29 Apr 2022
LAPSUS$ breached T-Mobile systems, stole source code

LAPSUS$ breached T-Mobile systems, stole source code
T-Mobile has denied that the hackers obtained customer or government information
25 Apr 2022
Thoma Bravo acquires SailPoint for $6.9 billion

Thoma Bravo acquires SailPoint for $6.9 billion
Following the acquisition, SailPoint will no longer be listed on any public market
11 Apr 2022
Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus

Okta reveals full extent of LAPSUS$ breach as hackers announce hiatus
Okta's CSO expressed regret over the company's handling of the situation, namely the lengthy delay between identifying the security incident and notif…
23 Mar 2022
SentinelOne to acquire Attivo Networks for $617 million

SentinelOne to acquire Attivo Networks for $617 million
The deal will broaden SentinelOne's access to extended detection and response technology
17 Mar 2022
The state of SD-WAN, SASE and zero trust security architectures
The state of SD-WAN, SASE and zero trust security architectures
Be a leader in the deployment of zero trust, SD-WAN and SASE
8 Mar 2022
Busting the myths about SSO
Busting the myths about SSO
Why SSO capability is critical to the success of IAM
7 Mar 2022
Gartner is mapping the future of secure access. Okta is helping organisations get there
Gartner is mapping the future of secure access. Okta is helping organisations get there
Creating unified, consistent digital identities for users
7 Mar 2022
Three ways your customer identity strategy fuels business growth
Three ways your customer identity strategy fuels business growth
Moving your business forward in innovative ways to jump-start growth
7 Mar 2022
Decoding Customer IAM (CIAM) vs. IAM
Decoding Customer IAM (CIAM) vs. IAM
What’s the difference between CIAM and IAM?
7 Mar 2022
Build vs. buy: Roll your own auth vs. a pre-built identity layer
Build vs. buy: Roll your own auth vs. a pre-built identity layer
Challenges of identity and access management
7 Mar 2022
Identity is key to stopping these five cyber security attacks
Identity is key to stopping these five cyber security attacks
Many attacks begin with the same weakness: user accounts
7 Mar 2022
Industry working group aims to standardize blockchain 'Identity of Things'

Industry working group aims to standardize blockchain 'Identity of Things'
Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices
15 Dec 2021
What is single sign-on (SSO)? 

What is single sign-on (SSO)?
We explain how SSO works and why you need it
2 Dec 2021
Your journey to zero trust
Your journey to zero trust
What you wish you knew before you started
2 Dec 2021