Identity & Access Management (IAM)
Featured One-Minute Insights
Sept 2024
How are U.S. CISOs Addressing Liability Risk?
New regulations taking effect in the U.S. mean that cybersecurity leaders could face legal liability in the event of an incident. What strategies are they using to protect themselves?
Active Ambassadors in This Topic
Community Posts
If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it. The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world. What do others think ? How could this impact your organization ?
Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge
dentist: so, are you flossing? me: are you using a unique password for every account? Jokes apart, how big of a problem is password management and support in your environment?
Question about SSO and WordPress: Does anybody have experience with miniorange? They seem to have a bunch of interesting solutions. The first workflow I'm looking at is to use the user DB from one WP site on to a second one with a simple plugin, but they also have more advanced options like managing the full LDAP or syncing 3rd party apps. This could be interesting to link a download center with a LMS system swell as the internal Office365 users and clients using a Jira or confluence system. Other options would be Okta and Onelogin it seems. https://plugins.miniorange.com/single-sign-on-sso-between-two-wordpress-sites
What password-alternative technology will eventually dominate?
Big Data16%
Remote Work19%
Microservices / Containerization13%
CI / CD7%
Zero-Trust15%
Automation2%
Digital Transformation17%
Cloud / Cloud Native2%
DevOps or DevSecOps3%
Other (comment)1%
If you were paying for an Identity Theft protection service, would you upgrade to add phishing monitoring capabilities that would immediately notify you if your credentials were stolen or being exposed in a phishing attack?
Yes90%
No9%
Perimeter 818%
ExpressVPN40%
NordVPN Teams21%
Twingate9%
Windscribe5%
CyberGhost4%
IPVanish
Other (comment below!)11%