Securing physical or digital assets are at the heart of reducing enterprise and business risks. Identity management solutions help enterprises verify a user’s identity and ensure that only authorized users access facilities, applications, systems or networks. Let’s explore a sampling of the latest identity management solutions.
Claroty researchers have uncovered six critical vulnerabilities in third-party license management components, which could expose operational technology (OT) environments (hardware and software components) across numerous industries to exploits via cyberattacks.
The Government Communications Security Bureau from New Zealand is encouraging public and private sector leaders to get more connected with their organizations’ cybersecurity governance.
Threat actors breached the network of cybersecurity company Avast in a sophisticated cyber operation, referred to as “Abiss,” that likely attempted to poison the supply chain and target its anti-virus software, CCleaner.