Articles tagged with: #identity Clear filter
What Security Teams Are Looking for in Identity Management Today

What Security Teams Are Looking for in Identity Management Today

Cyber Defense Magazine www.cyberdefensemagazine.com

Identity management gives organizations better visibility and control over their identity infrastructure - if they use the right approach. Well regarded cybersecurity thought-leader, Francis Odum recently noted that a company's identity posture...

Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function

Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.02643v1 Announce Type: new Abstract: Physically Unclonable Functions (PUFs) are a promising solution for identity verification and asymmetric encryption. In this paper, a new Resistive Random Access Memory (ReRAM) PUF-based protocol is presented to create a physical ReRAM PUF with a large challenge space. This protocol uses differential reads from unformed ReRAM as the method for response generation. Lastly, this paper also provides an experimental hardware demonstration of this...

Top 10 Best Fraud Prevention Companies in 2025

Top 10 Best Fraud Prevention Companies in 2025

Cyber Security News cybersecuritynews.com

In 2025, digital transactions are at an all-time high, but so are the risks of fraud. Businesses in banking, e-commerce, fintech, and even social networks are facing increasing pressure to secure their platforms against identity theft, payment fraud, and cybersecurity threats. Fraud prevention tools have evolved into AI-driven, machine-learning-powered solutions that proactively monitor suspicious transactions

Identity data via GraphQL - All users with the same passwords (PowerShell)

Identity data via GraphQL - All users with the same passwords (PowerShell)

CrowdStrike www.reddit.com

I was inspired by a talk at Fal.Con to try to pull some reports on accounts using the same password from the Identity API. For me, it was a bit of a learning curve due to GraphQL based API's being an absolute mystery to me (they still are). With some trial and error I have what I think is a nice output, showing by group, every user in AD using the same password, including if the account is admin, password last set and risk score. Hopefully someone finds this useful! You will need an API key...

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

The Hacker News thehackernews.com

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

Zero Trust-based Decentralized Identity Management System for Autonomous Vehicles

Zero Trust-based Decentralized Identity Management System for Autonomous Vehicles

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.25566v1 Announce Type: new Abstract: The rise of autonomous vehicles (AVs) promises to significantly enhance transportation safety and efficiency by mitigating human error, which is responsible for over 90\% of road accidents. However, the increasing connectivity of AVs introduces new cybersecurity challenges, as traditional perimeter-based security models are inadequate for dynamic and untrusted environments. This paper presents a novel Zero Trust-based Decentralized Identity...

Security Friction Quotient for Zero Trust Identity Policy with Empirical Validation

Security Friction Quotient for Zero Trust Identity Policy with Empirical Validation

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.22663v1 Announce Type: new Abstract: We define a practical method to quantify the trade-off between security and operational friction in modern identity-centric programs. We introduce the Security Friction Quotient (SFQ), a bounded composite index that combines a residual-risk estimator with empirically grounded friction terms (latency, failure rate, and helpdesk impact). We establish clarity properties (boundedness, monotonic response, and weight identifiability) with short proofs,...

Sponsored: Why identity is critical

Sponsored: Why identity is critical

Risky Business Media risky.biz

In this sponsored interview, Authentik CEO Fletcher Heisler talks to Tom Uren about how identity providers (IdP) are fundamental to everything an organisation does. He explains how organisations are making themselves resilient by managing their redundancy and failover options.

Crowdstrike Identity Protection Hardware Tokens

Crowdstrike Identity Protection Hardware Tokens

CrowdStrike www.reddit.com

Hi guys, I'm currently tinkering around with CS Identity Protection and noticed the lack of support for hardware tokens like FIDO2 or something similar. Afaik there was an announcement couple of days ago that some features are available in early access that introduce phishing resistant MFA but only with their own Crowdstrike Falcon for Mobile app. Does anybody know if there are plans to support FIDO2 tokens in the future since they are already established and users don't want to use two...

Found 7% dormant privileged accounts in audit. What's your threshold?

Found 7% dormant privileged accounts in audit. What's your threshold?

cybersecurity www.reddit.com

I was going through an identity audit recently and found that around 7% of accounts had no activity in 12+ months but still retained privileged access. That got me thinking, what's your threshold for "dormant but dangerous" ? When you come across these accounts, do you: Disable them immediately? Flag them for review? Keep them around "just in case"? Curious how you strike the balance between security cleanup and usability without locking people out unnecessarily. submitted by...

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Cyber Security News cybersecuritynews.com

A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate government identity applications and payment services. The malicious operation, active since approximately August 2024, employs advanced evasion techniques to deliver variants of the BankBot trojan family while maintaining an extensive infrastructure of over 100 domains. The threat

Joint Report: Fighting Back Against Infostealers  -  LastPass + GuidePoint Security

Joint Report: Fighting Back Against Infostealers - LastPass + GuidePoint Security

cybersecurity www.reddit.com

LastPass and GuidePoint Security recently release a joint research report titled: "Fighting Back Against Infostealers and How to Build Resilience in a Digital Identity Crisis." This collaboration between the LastPass TIME (Threat Intelligence, Mitigation, and Escalations) team and GuidePoint Security's GRIT Threat Intelligence team dives deep into the evolving threat of infostealers - malware designed to harvest credentials, cookies, and session data for resale on the dark web. The article...

DORA , BAIT certification / get basic knowledge for IT security : IAM

DORA , BAIT certification / get basic knowledge for IT security : IAM

cybersecurity www.reddit.com

Hello Fellow Cybersec colleagues, I have been tasked with a new role, which is to learn and understand how DORA , BAIT can be implemented, assessed in and around an Identity and Access Management system. As these are primary compliance related laws , Acts which most of the companies now want to be compliant with , I want to know how can an experience IAM professional