Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Network Detection & Response , Next-Generation Technologies & Secure Development , Security Operations Ashan Willy on Helping Clients Spot Hacker Techniques Insider Their Own 4 Walls Michael Novinson (MichaelNovinson) • February 3, 2023     Ashan Willy, CEO, Proofpoint (Image: Proofpoint) Proofpoint has long focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. See Also: Live Webinar | Navigating the…

Read More

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Active Defense & Deception , Next-Generation Technologies & Secure Development Ashan Willy’s First Deal as CEO Gets Proofpoint Into the Identity, Deception Spaces Michael Novinson (MichaelNovinson) • December 12, 2022     Ashan Willy has made his first acquisition as Proofpoint’s CEO, scooping up an identity startup established by Check Point’s former cloud and document security leader. See Also: Finding a Password Management Solution for Your Enterprise The Silicon Valley-based email security vendor says…

Read More

5 minutes with David Mahdi — Establishing digital trust with identity-first security

5 minutes with David Mahdi — Establishing digital trust with identity-first security

5 minutes with David Mahdi — Establishing digital trust with identity-first security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The top identity-based attacks and how to stop them

The top identity-based attacks and how to stop them

The top identity-based attacks and how to stop them | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The top identity-based attacks and how to stop them: Part 1

The top identity-based attacks and how to stop them: Part 1

The top identity-based attacks and how to stop them: Part 1 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Verifying identity in a world of fakes

Verifying identity in a world of fakes

Verifying identity in a world of fakes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity | 2021-07-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Three reasons why identity governance projects fail

Three reasons why identity governance projects fail

Three reasons why identity governance projects fail | 2021-02-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More