Remove topic iam-technologies
article thumbnail

Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023

Thales Cloud Protection & Licensing

Thales will have a strong presence at the Conference, with our executives discussing pressing issues around identity management, customer IAM, and authentication. This necessitates technology that is not overly reliant on third parties, where there is a risk of misuse of trust or non-compliance.

B2B 71
article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

The informative booth sessions include Jason Keenaghan , Director of IAM Product Management, on ‘Self-Sovereign Identity: Gateway to Privacy-First User Experience’, a joint session with Microsoft and Sarah Lefavrais , Manager, IAM Product Marketing, on the ‘Executive Order 14028 x Phishing Resistant Authentication = True Zero Trust’.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 2024 Duo Trusted Access Report: Navigating Complexity

Duo's Security Blog

The 2024 Duo Trusted Access Report: Navigating Complexity , gives us a chance to use the topic of complexity as a backdrop to examine trends (existing and emerging) in both access management and identity. To address identity-based attacks with greater efficacy, IAM analytics needs to be an inherent part of such a solution.

article thumbnail

Cyber Playbook: 10 Reasons Why Identity and Access Management Programs Fail

Herjavec Group

In the Herjavec Group 2021 Cybersecurity Conversations for the C-Suite Report , we explored the importance of a strong Identity and Access Management (IAM) Program. The IAM solution market is crowded and can be difficult to navigate. Listed below are some typical reasons IAM initiatives fail. Implement IAM Program.

article thumbnail

From Google Cloud Blog: “New Cloud Security Podcast by Google is here”

Anton on Security

We hope you’ll join us if you’re interested in the ways technology overlaps with process and bumps up against organizational design. If you have topics you’re interested in hearing about, please reach out and let us know. Topics covered: What is confidential computing? What risks are mitigated by confidential computing?

article thumbnail

Thales 2023 Data Threat Report: Sovereignty, Transformation, and Global Challenges

Thales Cloud Protection & Licensing

Organizations balanced security and privacy risks with opportunities opened by new technologies and business models. In broader terms, Identity and Access Management (IAM) has emerged as a top priority tool for preventing data breaches. 28% said the top attack targets were SaaS apps and cloud-based storage.

article thumbnail

NUVOLA: the new Cloud Security tool

Security Affairs

The tool helps the security community to address the complex topic of privilege escalation on cloud environments such as AWS. When it comes to AWS security, Identity and Access Management (IAM) permission misconfigurations have long held a spotlight, but that doesn’t mean they’re any easier to avoid. The Privilege Escalations Drama.