After Okta’s admission last week that 100% of its 18,400 customers were exposed to a breach of its customer support system, security experts are pondering the impact and future solutions.
The private equity from has invested billions of dollars in identity and access management (IAM), but now it's on Ping founder and CEO Andre Durand and his team to rationalize overlapping product lines.
With a recession potentially coming, some companies are cutting security teams. But moving more infrastructure to the cloud and reducing the number of vendors through consolidation may be the best ways to prepare.
While fewer cloud providers are suffering outages, customers should prepare for the uncommon event, especially when relying on cloud services for security.
Navigating Active Directory Security: Dangers and Defenses
Microsoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network access and sensitive data.
Kelly Sheridan
PDF
Microsoft s Active Directory (AD) has been a hot target for attackers for about as long as businesses have relied on the directory service to manage users, applications, data, machines, and myriad other components of their enterprise networks.
Securing AD is essential to protect user credentials, domain-joined systems, and sensitive data from unauthorized access. But it s no small task: AD is a large and complex environment with several moving parts and multiple groups involved in its management. Defenders have a lot to cover, and attackers have plenty of opportunity to take advantage.