Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: IAM

  1. Home
  2. IAM

Booz Allen Invests in Machine Identity Firm Corsha

‘Machine identities’, often used interchangeably with ‘non-human identities’ (NHIs), have been increasing rapidly since the start of digital transformation.

The post Booz Allen Invests in Machine Identity Firm Corsha appeared first on SecurityWeek.

Non-Human IAM Provider Aembit Raises $25 Million

Aembit has raised $25 million in Series A funding to protect non-human identities and minimize attack surface.

The post Non-Human IAM Provider Aembit Raises $25 Million appeared first on SecurityWeek.

P0 Security Banks $15M for Security Cloud Access

San Francisco secure cloud access startup gets backing from SYN Ventures, Zscaler, and Lightspeed Venture Partners.

The post P0 Security Banks $15M for Security Cloud Access appeared first on SecurityWeek.

Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign

Security researchers at Palo Alto Networks discover a threat actor extorting organizations after compromising their cloud environments using inadvertently exposed environment variables.

The post Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign appeared first on SecurityWeek.

IAM for MSPs Provider Evo Security Raises $6 Million

TechOperators leads a $6 million Series A funding round for Evo Security, a provider of IAM solutions for MSPs.

The post IAM for MSPs Provider Evo Security Raises $6 Million appeared first on SecurityWeek.

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform 

Device Authority raises $7 million in a Series A funding round for its enterprise identity and access management for IoT solution.

The post Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform  appeared first on SecurityWeek.

Okta Broadens Scope of Data Breach: All Customer Support Users Affected

okta-broadens-scope-of-data-breach:-all-customer-support-users-affected

Okta expands scope of October breach, saying hackers stole names and email addresses of all its customer support system users.

The post Okta Broadens Scope of Data Breach: All Customer Support Users Affected appeared first on SecurityWeek.

Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets

amazon-one-enterprise-enables-palm-based-access-to-physical-locations,-digital-assets

AWS announces Amazon One Enterprise, a palm-based identity service that enables users to easily access physical locations and digital assets.

The post Amazon One Enterprise Enables Palm-Based Access to Physical Locations, Digital Assets appeared first on SecurityWeek.

IAM Credentials in Public GitHub Repositories Harvested in Minutes

iam-credentials-in-public-github-repositories-harvested-in-minutes

A threat actor is reportedly harvesting IAM credentials from public GitHub repositories within five minutes of exposure.

The post IAM Credentials in Public GitHub Repositories Harvested in Minutes appeared first on SecurityWeek.

CISA Releases New Identity and Access Management Guidance

cisa-releases-new-identity-and-access-management-guidance

CISA has released new guidance on how federal agencies can integrate identity and access management into their ICAM architecture.

The post CISA Releases New Identity and Access Management Guidance appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it