article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A long supply chain adds third-party risks, as each partner’s security affects your own, making identity and access management more challenging. A recent report, B2B IAM – The Hidden Value of Third-Party Identities , indicates that external identities outnumber traditional employees by nearly two to one. It’s a win-win.

B2B
article thumbnail

The noodle soup of B2B IAM and third-party identities

Thales Cloud Protection & Licensing

The noodle soup of B2B IAM and third-party identities madhav Wed, 02/26/2025 - 07:29 Introduction: A messy bowl of terminology Identity management is no longer just about employees. B2B IAM The Hidden Value of Third-Party Identities. So why is B2B IAM such a tangled mess of terminology, and does it really matter?

B2B
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Third-Party Access in Critical Infrastructure - A Growing Identity Challenge

Thales Cloud Protection & Licensing

Third-Party Access in Critical Infrastructure - A Growing Identity Challenge madhav Tue, 07/15/2025 - 07:16 The digital shift in critical infrastructure is exposing a risk that many leaders haven’t fully accounted for: the rising influence - and volume - of external users. What is B2B IAM? Want to go deeper?

B2B
article thumbnail

ISO 27001 Readiness Checklist: Mastering Certification for Your Organization

Centraleyes

Use a self-assessment checklist to evaluate documentation, scope, risks, and your Statement of Applicability. Cyber insurance providers and B2B clients increasingly expect formal certification- especially in sectors like finance, SaaS, healthcare, and defense. Do your risk assessments align with your controls? Set your timeline.

article thumbnail

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025

SecureList

We have also seen spammers offering dubious deals like purchasing a database of over 400,000 businesses for $100, supposedly to be used for selling the company’s B2B products, or manipulating reviews on a review platform.

article thumbnail

Passwordless 360°: The Evolution of Authentication in 2025

Thales Cloud Protection & Licensing

Over security risks, passwords generate frustration among end users and can damage your brand. With passkeys, users can authenticate using credentials that may either sync across ecosystems or be device-bound for high-risk scenarios. The Thales B2B IAM report revealed that external identities now outnumber internal ones by 2:1 to 3:1.

article thumbnail

The Best 15 Enterprise Compliance Solutions Tools of 2024

Centraleyes

The Shift Toward Revenue-Positive Compliance A 2023 study by Todd Haugh and Suneal Bedi from Indiana University’s Kelley School of Business offers groundbreaking insights into how compliance can create positive value beyond traditional risk management. Additionally, 44% of them have rejected employers due to poor environmental compliance.