Anatomy of identity-based attacks
Helping security teams mitigate identity-based attacks
As a security practitioner, protecting your organization’s data is your number one priority. Yet with the explosion of the mobile and hybrid workforce, SaaS adoption, and application modernization, new attack methodologies arise all the time.
And even with a Zero Trust Architecture enforcing principles of least privilege, security teams still need proper identity and access management (IAM) solutions incorporated into their security projects to thwart these attacks.
Download this whitepaper to learn from our security experts how teams like yours can mitigate threats and fortify your defences.
Provided by Okta
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Google is scrapping its dark web report featureNews Google said while the dark web report feature offered “general information”, the tool didn’t provide “helpful next steps” for users potentially impacted by a breach.
-
AI means you're probably going to need bigger developer teamsAnalysis Software developers may be forgiven for worrying about their jobs in 2025, but the end result of AI adoption will probably be larger teams, not an onslaught of job cuts.
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
Research shows the financial benefits of implementing zero trustNews With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI pushNews The move from Microsoft looks to bolster agent security and prevent misuse
-
Zero trust gains momentum amid growing network visibility challengesNews Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to successNews Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security toolsNews The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
-
The evolution of SASE and its importance in zero trustSupported Content SASE has been an increasingly important security framework for five years – but integrating zero trust is crucial to its success
-
How to implement identity and access management (IAM) effectively in your businesswhitepaper With pressure from the board and a new wave of threats, security leaders looking to implement IAM should start small and lean on the data
