Anatomy of identity-based attacks
Helping security teams mitigate identity-based attacks


As a security practitioner, protecting your organization’s data is your number one priority. Yet with the explosion of the mobile and hybrid workforce, SaaS adoption, and application modernization, new attack methodologies arise all the time.
And even with a Zero Trust Architecture enforcing principles of least privilege, security teams still need proper identity and access management (IAM) solutions incorporated into their security projects to thwart these attacks.
Download this whitepaper to learn from our security experts how teams like yours can mitigate threats and fortify your defences.
Provided by Okta
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
Research shows the financial benefits of implementing zero trust
News With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI push
News The move from Microsoft looks to bolster agent security and prevent misuse
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security tools
News The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
-
The evolution of SASE and its importance in zero trust
Supported Content SASE has been an increasingly important security framework for five years – but integrating zero trust is crucial to its success
-
How to implement identity and access management (IAM) effectively in your business
whitepaper With pressure from the board and a new wave of threats, security leaders looking to implement IAM should start small and lean on the data
-
Game-changing data security in seconds. Lepide’s real time In-browser demo
whitepaper Protect sensitive data and detect threats