< ciso
brief />
Tag Banner

All news with #identity security tag

115 articles · page 2 of 6

Cloud Run: IAP integration and DRS-compatible public access

🔒 Cloud Run now supports direct Identity-Aware Proxy (IAP) integration and a new option to allow public access compatible with Domain Restricted Sharing. Enable IAP with a single click or via the --iap flag without provisioning load balancers, bringing context-aware, enterprise-grade authentication to serverless apps at no added load balancer cost. The 'Allow Public access' toggle disables the IAM invoker check to support public websites or private microservices that rely on network-level or organizational controls, and IAP’s CORS handling permits unauthenticated OPTIONS for preflight while authenticating other requests.
read more →

AWS at RSAC 2026: Unifying Security and Data for AI

🔒 Visit AWS at booth S-0466 in South Expo to experience interactive demos, partner integrations, and an AI-powered Humanoid Security Guardian that generates customized well-architected guides via QR code. AWS security specialists will present sessions on privacy-by-design, trusted identity for autonomous agents, container supply-chain protection, and preparing for AI-native incidents. Join hands-on workshops and CTF challenges in Cloud Village, March 23–26, and use a Partner Passport to collect booth stamps, earn swag, and enter daily raffles.
read more →

AWS Builder ID Adds Sign-in Options for GitHub, Amazon

🔐 AWS Builder ID now supports Sign in with GitHub and Amazon, expanding social login options beyond Google and Apple. The change enables developers to access AWS Builder Center, AWS Training and Certification, and Kiro using existing GitHub or Amazon credentials. This reduces password management overhead, lowers forgotten-password incidents, and streamlines both new user registration and returning sign-ins for builders and students.
read more →

Just 24% Test Identity Disaster Recovery Every Six Months

🔐 A global survey by Quest Software of 650 IT and security practitioners found that only 24% of organisations test identity disaster recovery every six months, while 24% never test recovery plans. The report warns many firms focus on preventative controls and detection rather than response and recovery, increasing risk when identity protections fail. Respondents identified gaps in non-human and third-party identities, legacy on-premises systems and privileged accounts. Adoption of ITDR programmes is rising (57%), and 79% believe AI can improve recovery by reducing alert fatigue and correlating signals.
read more →

CISO Priorities for 2026: AI, Identity, and Resilience

🔐 2026 will bring faster, cheaper, and more credible cyberattacks as AI and automation lower the skill barrier for attackers. Industry leaders from Banco Santander, Vodafone, NordVPN, Sophos, and Cisco emphasize a shift from perimeter defenses to identity-centric, automated, resilience-focused models. Priority actions include continuous identity verification, integrated AI-driven security, XDR consolidation, supply-chain risk management, and stronger detection, response, and data-protection controls implemented with minimal customer friction.
read more →

AWS simplifies IAM role creation in service workflows

🔐 AWS Identity and Access Management (IAM) now lets you create and configure IAM roles directly within many service console workflows, so you no longer need to switch to the IAM console. A new in-context permissions panel appears during relevant tasks and supports default policies or a simplified statement builder for custom permissions, while retaining full IAM role-management capabilities. Initially available in the US East (N. Virginia) Region, the feature will roll out to additional services and regions. This streamlines role setup for services such as EC2, Lambda, EKS and more.
read more →

AWS adds denying policy ARNs to access denied errors

🔐 AWS now includes the ARN of the policy that caused an AccessDenied error for same-account and same-organization requests. This enhancement adds only the policy ARN (not policy content) for SCPs, RCPs, permissions boundaries, session policies, and identity-based policies, and does not change authorization logic. The rollout begins early 2026 across all Regions, improving troubleshooting and cross-team communication.
read more →

Identity-Verified Onboarding to Mitigate Deepfake Threats

🛡️ Cloudflare announces integration with Nametag to add workforce identity verification to Cloudflare Access, confronting the emerging 'remote IT worker' fraud where organized actors use stolen or deepfaked identities to infiltrate companies. The OIDC-based flow requires a selfie and government ID scan, and Nametag's Deepfake Defense uses cryptography and AI to attest liveness and identity. Verification completes in under 30 seconds and no biometrics are stored. This layer enables identity-based policies before access is granted.
read more →

Gateway Authorization Proxy: Identity-Aware Policies

🔐 Cloudflare's new Gateway Authorization Proxy shifts identity from devices to the network, enabling per-user enforcement for unmanaged endpoints and virtual desktops. By using a Cloudflare Access–style login and signed JWT domain cookies, the proxy logs individual users, supports multiple identity providers, and allows instant revocation without installing a client. PAC File Hosting further simplifies deployment with templates and an AI assistant.
read more →

AWS IAM Identity Center Adds IPv6 in Taipei and GovCloud

🌐 AWS IAM Identity Center now supports IPv6 through dual‑stack endpoints in the AWS Asia Pacific (Taipei) and AWS GovCloud (US) Regions, completing global availability wherever IAM Identity Center is offered. Clients and browsers will resolve either IPv4 or IPv6 addresses based on network and client protocol. Administrators can find the dual-stack portal URL in the IAM Identity Center console under Settings and share it with their workforce; GovCloud deployments should consult region-specific documentation.
read more →

Top CISO Priorities for RSA 2026: AI, CTEM, Resilience

🔐 RSA 2026 will spotlight how AI agents, CTEM, cyber resilience, identity, and AI security are reshaping CISO agendas. Expect demonstrations of AI-SOC capabilities, expanded CTEM platforms, and renewed emphasis on identity as the perimeter, alongside warnings about hallucinations, data quality, and vendor overreach. Arrive prepared with prioritized requirements, cleaned data, and a plan to upskill teams for effective human–agent teaming.
read more →

CrowdStrike FalconID Adds Phishing-Resistant MFA Support

🔐 FalconID is now generally available, delivering phishing‑resistant, FIDO2-based authentication built into the Falcon sensor and delivered via the Falcon for Mobile app. It replaces passwords, push notifications and one‑time codes with biometric, device‑bound verification and cryptographic domain binding. Authentication decisions are driven by real‑time identity, endpoint and SaaS telemetry to minimize friction while blocking credential abuse. For legacy apps, FalconID offers secure indirect authentication, and when paired with SGNL it enables continuous, risk‑based authorization across environments.
read more →

Identity-First AI Security: Adding Intent to Access

🔐 Today’s enterprise AI agents are no longer passive assistants but active operators that authenticate to systems using API keys, OAuth tokens, cloud roles, and service accounts. The article advocates treating every agent as a first-class identity with unique identities, lifecycle management, defined roles, clear ownership, and auditability. It warns that identity alone is insufficient because agents are dynamic and can drift from original missions; instead it promotes intent-based permissioning, activating privileges only when an agent's declared mission and runtime context justify the action. Practical steps include inventorying agents, assigning lifecycle-managed identities, documenting approved missions, and enforcing conditional access based on identity, intent, and context.
read more →

Prioritizing Identity Risk by Context, Not Ticket Volume

🔐 Most identity programs still triage work like IT ticket queues—by volume, noise, or failed control checks—an approach that breaks when environments are increasingly non-human and partially onboarded. Identity risk is a function of controls posture, hygiene, business context, and intent; missing controls matter differently depending on what an identity can access. Hygiene failures such as orphan, local, or dormant accounts create low-effort paths for attackers and autonomous agents. Orchid builds an identity graph from telemetry, scores contextual risk, ranks toxic combinations, and sequences remediation to reduce real exposure rather than just shrink a findings list.
read more →

When Identity Isn't the Weak Link, Access Still Is

🔐 Modern workforce mobility has made identity verification necessary but insufficient: authentication proves who a user is, not how risky their access may be. Attackers increasingly exploit device and session blind spots — legacy protocols, unmanaged endpoints, token theft, and MFA bypass — to reuse trusted identities. Specops's Infinipoint extends verification beyond login by continuously assessing both user and device to reduce these exposure points without disrupting productivity.
read more →

Identity Posture Becomes Key Metric in Cyber Underwriting

🔒 Insurers and regulators are increasingly using identity posture as a primary underwriting metric, shifting focus from isolated technical controls to evidence of ongoing identity governance. Evaluations emphasize password hygiene, visibility into credential exposure, privileged access management, and comprehensive MFA coverage across remote, email, and privileged access paths. Organizations that can demonstrate continuous monitoring, regular access certification, and the removal of shared or never‑expiring credentials are more likely to secure favorable premiums and avoid claim disputes.
read more →

Infostealers: Turning Stolen Credentials into Identities

🔐Modern infostealers harvest credentials, session data, cookies, and local files, turning a single compromise into a persistent identity asset. Specops researchers analyzed over 90,000 infostealer dumps and more than 800 million rows, showing how disparate signals tie accounts, employers, and roles to real people. By blocking known-compromised passwords across Active Directory, Specops Password Policy aims to reduce reuse and downstream enterprise risk.
read more →

Exposing Insider Threats with Data, Identity & HR Context

🔍 CrowdStrike describes how combining Falcon Data Protection, Falcon Next-Gen Identity Security, and HR context enables detection of insider threats through multi-layer telemetry correlation, behavioral baselines, and automated risk scoring. The Insider Threat Analytics and User Activity Investigation dashboards surface anomaly hunting leads — rare destinations, first-seen egress, off-hours activity, USB and unusual endpoint transfers — and provide prioritized user risk lists. Workday integration and content inspection improve visibility for departing employees and sensitive data.
read more →

Passwords to Passkeys: ISO 27001 Compliance Practical Guide

🔐 Password-based authentication is increasingly replaced by passkeys—FIDO2/WebAuthn-backed credentials that store private keys on devices and typically meet AAL2/AAL3 assurance per NIST SP 800-63B. This article explains how organizations can adopt passkeys while remaining compliant with ISO/IEC 27001, mapping changes to Annex A controls (Access Control, Authentication Information, Secure Authentication) and documenting risk treatment. It highlights benefits, common risks such as device loss and downgrade attacks, and practical migration steps for enterprise deployment.
read more →

Why Identity Recovery Is Central to Cyber Resilience

🔐 Ransomware has shifted boardroom and security priorities by showing that identity compromise can block recovery even after applications and data are restored. Security leaders now treat identity recovery as a designed capability, emphasizing immutable backups, automated restoration for Active Directory, and isolated backup platforms. Vendors such as Cognizant and Rubrik are positioning integrated services that combine orchestration, rapid recovery, and compliance-ready reporting to shorten downtime and reduce attacker re-entry risk.
read more →