Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: IAM

  1. Home
  2. IAM

Keycard Emerges From Stealth Mode With $38 Million in Funding

The company’s IAM platform identifies AI agents, supports assigning permission to them, and tracks all activity.

The post Keycard Emerges From Stealth Mode With $38 Million in Funding appeared first on SecurityWeek.

Defakto Raises $30 Million for Non-Human IAM Platform

Defakto’s Series B funding, which brings the total raised to $50 million, was led by XYZ Venture Capital.

The post Defakto Raises $30 Million for Non-Human IAM Platform appeared first on SecurityWeek.

Descope Raises $35 Million in Seed Round Extension

descope-raises-$35-million-in-seed-round-extension

The identity and access management provider will invest in agentic identity R&D, expand to new regions, and hire new talent.

The post Descope Raises $35 Million in Seed Round Extension appeared first on SecurityWeek.

Booz Allen Invests in Machine Identity Firm Corsha

‘Machine identities’, often used interchangeably with ‘non-human identities’ (NHIs), have been increasing rapidly since the start of digital transformation.

The post Booz Allen Invests in Machine Identity Firm Corsha appeared first on SecurityWeek.

Non-Human IAM Provider Aembit Raises $25 Million

Aembit has raised $25 million in Series A funding to protect non-human identities and minimize attack surface.

The post Non-Human IAM Provider Aembit Raises $25 Million appeared first on SecurityWeek.

P0 Security Banks $15M for Security Cloud Access

San Francisco secure cloud access startup gets backing from SYN Ventures, Zscaler, and Lightspeed Venture Partners.

The post P0 Security Banks $15M for Security Cloud Access appeared first on SecurityWeek.

Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign

Security researchers at Palo Alto Networks discover a threat actor extorting organizations after compromising their cloud environments using inadvertently exposed environment variables.

The post Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign appeared first on SecurityWeek.

IAM for MSPs Provider Evo Security Raises $6 Million

TechOperators leads a $6 million Series A funding round for Evo Security, a provider of IAM solutions for MSPs.

The post IAM for MSPs Provider Evo Security Raises $6 Million appeared first on SecurityWeek.

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform 

Device Authority raises $7 million in a Series A funding round for its enterprise identity and access management for IoT solution.

The post Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform  appeared first on SecurityWeek.

Okta Broadens Scope of Data Breach: All Customer Support Users Affected

okta-broadens-scope-of-data-breach:-all-customer-support-users-affected

Okta expands scope of October breach, saying hackers stole names and email addresses of all its customer support system users.

The post Okta Broadens Scope of Data Breach: All Customer Support Users Affected appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it