Articles Related to access management

How to stop attackers from moving laterally through your network

Attackers want to laterally through IT networks to obtain the credentials of privileged accounts. A Microsoft blog shows how they can be stopped

Firms weakening security by not policing user accounts, warns Sophos

Failing to delete user accounts of former staff to prevent attackers from creating phony new accounts are opening entry points, security vendor Sophos warns

Getting on the right side of multi-cloud security

It turns out that when it comes to cloud, you can have too much of a good thing. Some organizations that have moved into...

It’s time to get serious about identity and access management

The appearance of billions of new endpoint devices has brought with it billions of new potential security problems. This has made manual identity and...

Identity & access management the focus of Dell’s new security approach

Dell wants to bring identity and access management into the midmarket, and says it can help drive user compliance with security policy.

Intel buys Canadian firm to handle ‘password fatigue’

PasswordBox remembers all your passwords

BC security firm sold to Kaseya

Scorpion Software bought by IT management provider Kaseya

Stay on op - Ge the daily news in your inbox