Identity And Access Management (IAM)
Discover expert analysis on IAM with news, features and insights from the team at IT Pro.
-
Enterprises are adopting agents faster than they can secure and govern themNews Identity systems developed for human interaction fail to cope with the new demands
By Emma Woollacott Published
News -
Agent identity governance can't keeping up with adoption rates – and it’s creating a security nightmareNews Enterprises are leaving high-privilege keys unchanged for months or years at a time
By Emma Woollacott Published
News -
Palo Alto Networks CEO hails ‘the end of identity silos’ as firm closes CyberArk acquisitionNews Palo Alto Networks' CEO Nikesh Arora says the $25bn CyberArk acquisition heralds "the end of identity silos" for customers, enabling them to supercharge privileged access management.
By Emma Woollacott Published
News -
CrowdStrike targets identity security gains with $740 million SGNL acquisitionNews The acquisition will expand CrowdStrike’s Falcon platform with new privilege and access capabilities to bolster agentic identity security
By Daniel Todd Published
News -
In the age of all-in-one platforms, how can partners avoid becoming interchangeable?Industry Insights Complacency is the real problem, rather than platformization...
By Peter Wilson Published
Industry Insights -
Cloud security teams are in turmoilNews Cloud security teams are scrambling to keep pace with expanding attack surfaces, new research from Palo Alto Networks shows, largely due to the rapid adoption of enterprise AI solutions.
By Emma Woollacott Published
News -
Docusign boots Irish presence with €4.5 million Dublin investmentNews The electronic signature software company says the expansion of its R&D centre will strengthen its European AI and R&D capabilities
By Emma Woollacott Published
News -
Everything you need to know about Entra Agent IDNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
By Nicole Kobie Published
News -
Why employee offboarding poses huge cybersecurity risksNews Enterprises should act swiftly to revoke rights and access, regardless of the manner of an employee’s departure.
By Ross Kelly Published
News -
Okta acquires Axiom Security to enhance privileged access managementNews Axiom’s identity-centric PAM capabilities will be integrated into Okta’s Privilege Access platform over the coming months
By Daniel Todd Published
News -
Cyber teams are struggling to keep up with a torrent of security alertsNews Fragmented identity security processes are creating blind spots, and the proliferation of tools doesn't help
By Emma Woollacott Published
News -
Identity security is more important than ever – here’s whyNews 78% of enterprises told Okta that controlling access and permissions for non-human identities is now their main identity security concern.
By Emma Woollacott Published
News