#sso-tools

[ follow ]
#ai-governance
Information security
fromTNW | Insights
1 hour ago

KeeperDB brings zero-trust database access to privileged access management

Database credentials are a major attack vector, and KeeperDB integrates access controls into its PAM platform to enhance security.
Cryptocurrency
fromnews.bitcoin.com
3 hours ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#ai
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromSecurityWeek
5 days ago
Artificial intelligence

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Artificial intelligence
fromSecurityWeek
5 days ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Privacy professionals
fromSilicon Canals
1 day ago

Fintech apps demand your passport for verification - then leave it on an unprotected server - Silicon Canals

Duc's exposed server revealed unprotected sensitive personal data, highlighting significant gaps in fintech data protection practices.
Business intelligence
fromInfoWorld
2 days ago

Kilo targets shadow AI agents with a managed enterprise platform

KiloClaw for Organizations enhances AI agent management with centralized governance, addressing security and compliance concerns for enterprises.
fromSecurityWeek
2 days ago

Linx Security Raises $50 Million for Identity Security and Governance

Linx has built an AI-native platform that maps, monitors, and governs human, non-human, and agentic identities across the entire enterprise environment, relying on real-time detection and automated remediation to reduce identity-related risks.
Venture
DevOps
fromTechzine Global
3 days ago

IGEL brings 'Smarter, Zero Trust' approach Contextual Access to endpoints

IGEL's Contextual Access enhances endpoint security by adapting access rights based on user, device, location, and trust status.
#generative-ai
fromBig Think
4 days ago
Digital life

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
4 days ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
2 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Deliverability
fromFast Company
3 days ago

Google just made it easier to escape your old Gmail username

Gmail users can now change their email addresses, starting with U.S. users, while retaining their email history and data.
#okta
#cybersecurity
Artificial intelligence
fromTearsheet
2 days ago

What a bank-client relationship looks like when banks control the data behind the UX - Tearsheet

Grasshopper's Model Context Protocol enables secure AI integration with banking data while maintaining client control and data security.
fromZDNET
2 days ago

Local vs. Microsoft account in Windows 11: How to decide and set up your preference

When you set up a Windows 11 PC for the first time, you're required to create a user account that allows you to act as the administrator for that computer. The Windows Setup program really, really wants you to use a Microsoft account, which frustrates longtime Windows users who prefer local accounts.
Privacy technologies
fromTechzine Global
4 days ago

IGEL introduces reference architectures for secure cloud desktops

"For healthcare, government, and contact center environments, reducing risk at the endpoint is essential. By aligning IGEL's immutable endpoint OS and Adaptive Secure Desktop™ with Windows 365 and Microsoft Azure Virtual Desktop, these reference architectures give organizations clear guidance for delivering secured and resilient digital workspaces."
DevOps
#mobile-security
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
fromTheregister
3 weeks ago
Privacy technologies

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Privacy technologies
fromTheregister
3 weeks ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
EU data protection
fromTNW | Offers
1 week ago

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
Privacy technologies
fromEngadget
4 days ago

Proton adds a secure video conferencing service called Meet to its toolbox

Proton launches Meet, a privacy-focused video-calling service, competing with Microsoft and Google while ensuring user anonymity and security.
Privacy professionals
fromSecurityWeek
1 week ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
#password-managers
Apple
fromZDNET
3 weeks ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Apple
fromZDNET
3 weeks ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Healthcare
fromNextgov.com
3 weeks ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
#ai-security
Information security
fromTechRepublic
1 week ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
#reddit
Privacy technologies
fromMashable
1 week ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Privacy technologies
fromMashable
1 week ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Information security
fromComputerWeekly.com
3 days ago

Cato Networks unveils modular adoption model for SASE platform | Computer Weekly

Cato Networks introduces a modular adoption model for its SASE platform, allowing organizations to expand networking and security capabilities as needed.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Business intelligence
fromBusiness Matters
3 weeks ago

The Growing Importance of Digital Identity in the Financial System

Clear business identity through standardized digital identifiers like LEI reduces financial risk, enables faster compliance checks, and supports trust across international commerce.
Deliverability
fromWIRED
4 weeks ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
fromInfoQ
1 month ago

Platforms for Secure API Connectivity With Architecture as Code

Building APIs is so simple. Caveat, it's not. Actually, working with tools with no security, you've got a consumer and an API service, you can pretty much get that up and running on your laptop in two or three minutes with some modern frameworks. Then, authentication and authorization comes in. You need a way to model this.
Web frameworks
Information security
fromTNW | Offers
1 week ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
Privacy technologies
fromAzure DevOps Blog
2 weeks ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
DevOps
fromSecurityWeek
1 month ago

AWS Expands Security Hub Into a Cross-Domain Security Platform

AWS Security Hub Extended integrates AWS security tools and curated third-party solutions into a unified mini-SOC platform for simplified enterprise security management across multiple domains.
#ai-agent-security
Information security
fromTheregister
2 weeks ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
2 weeks ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTechzine Global
2 weeks ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTheregister
2 weeks ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
2 weeks ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTechzine Global
2 weeks ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTheregister
2 weeks ago

Microsoft Intune: Lock it down, warn feds after Stryker

Iran-linked Handala attacked Stryker using compromised Microsoft Intune to wipe devices; CISA urges companies to implement least privilege access controls and follow Microsoft security best practices.
Privacy technologies
fromZDNET
3 weeks ago

I switched password managers without losing a single login - here's how

Switching password managers involves exporting passwords to CSV and importing them into a new app, then reviewing settings before deleting the old manager.
Information security
fromZDNET
2 weeks ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Privacy technologies
fromTechzine Global
3 weeks ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
fromblog.logrocket.com
2 months ago

What are the key challenges in scaling MFA for large organizations? - LogRocket Blog

Most design specs break down in development because they're built for designers, not developers. This article shows how to write specs that reflect real-world logic, states, constraints, and platform behavior not just pixels. Rafael Basso Jan 20, 2026 11 min read A practical guide to AI in UX design, covering predictive UX, generative assistance, personalization, automation, and the risks of overusing AI. Shalitha Suranga Jan 14, 2026 11 min read
UX design
Information security
fromSecuritymagazine
3 weeks ago

Why Are Platform Ecosystems - Like Salesforce - Often Targeted?

Salesforce warned users of increased threat actor activity exploiting misconfigured publicly accessible sites and permissive guest user settings to gain unauthorized data access for social engineering and vishing campaigns.
Information security
fromTechzine Global
3 weeks ago

Red Access turns any firewall into a full SSE platform

Red Access launches firewall-native SSE that adds Security Service Edge capabilities to existing firewalls without requiring replacement, agents, or browser changes, deploying up to 80 percent faster than traditional SSE platforms.
Information security
fromSecurityWeek
3 weeks ago

The Human IOC: Why Security Professionals Struggle with Social Vetting

Security teams must apply the same rigorous vetting standards to people and organizations as they do to security information to avoid reputational damage and poor decision-making.
Information security
fromTechRepublic
3 weeks ago

Hackers Pose as IT Staff in Microsoft Teams to Install Malware

Attackers impersonate Microsoft Teams and IT personnel to deliver A0Backdoor malware through malicious MSI installers, using social engineering and DLL sideloading techniques to establish persistent network access.
Information security
fromThe Hacker News
4 weeks ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Privacy professionals
fromThe Hacker News
2 months ago

Filling the Most Common Gaps in Google Workspace Security

Prioritize hardened Google Workspace configurations—especially Gmail protections and access controls (MFA and beyond)—then augment native tooling where capabilities fall short.
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
#access-control
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
fromLogRocket Blog
1 month ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromComputerworld
2 months ago

Enterprises still aren't getting IAM right

Employees frequently bypass identity and access controls while agentic AI worsens privilege risk, leaving most organizations with inadequate just-in-time privileged access models.
Information security
fromChannelPro
2 months ago

Ping Identity snaps up Keyless to tackle AI-powered security threats

Ping Identity acquired Keyless to add zero-knowledge, device-independent biometric authentication and fast cryptographic re-verification to its identity security platform.
fromTechzine Global
2 months ago

Microsoft requires MFA for Microsoft 365 admin center

Starting February 9, 2026, Microsoft will enforce multi-factor authentication (MFA) for all users who want to access the Microsoft 365 admin center. Administrators without MFA will face login blocks starting next month. The measure is part of Microsoft's strategy against credential-based attacks, which remain a significant attack vector. The company began a soft rollout in February last year, but starting next month, the requirement will be fully enforced for all tenants.
Information security
fromThe Hacker News
2 months ago

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0 "This issue [...] could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform," the company said in an advisory released Monday.
Information security
Information security
fromthehackernews.com
1 month ago

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

Continuous identity observability uncovers embedded credentials, application-level authorization, and unmanaged identity paths to eliminate Identity Dark Matter and reduce unseen identity risk.
Information security
fromSecurityWeek
1 month ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromComputerworld
1 month ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
fromInfoWorld
2 months ago

Descope introduces Agentic Identity Hub 2.0 for managing AI agents

Descope has announced Agentic Identity Hub 2.0, an update to its no-code identity platform for AI agents and Model Context Protocol (MCP) servers. The new release gives developers and security teams a dedicated UI and control plane to manage authorization, access control, credentials, and policies for AI agents and MCP servers, Descope said. Unveiled January 26, Agentic Identity Hub 2.0 lets MCP developers and AI agent builders use the platform to manage AI agents as first-class identities alongside human users,
Information security
Information security
fromTechzine Global
1 month ago

Okta tackles shadow AI with new agent discovery tools

Agent Discovery provides visibility into unauthorized AI agents by detecting OAuth connections and mapping unsanctioned AI tool access and permissions to corporate apps.
Information security
fromTheregister
2 months ago

FortiGate SSO bug still exploitable despite December patch

Attackers have found a new way to bypass Fortinet's December patch for FortiCloud SSO, enabling compromise of updated FortiGate devices and exfiltration of configurations.
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
fromThe Hacker News
2 months ago

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it's continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.
Information security
Information security
fromSecurityWeek
2 months ago

Microsoft Moves Closer to Disabling NTLM

NTLM authentication will be disabled by default in upcoming Windows Server and client releases, requiring explicit re-enablement and migration to Kerberos.
fromThe Hacker News
2 months ago

The Hidden Risk of Orphan Accounts

Traditional IAM and IGA systems are designed primarily for human users and depend on manual onboarding and integration for each application - connectors, schema mapping, entitlement catalogs, and role modeling. Many applications never make it that far. Meanwhile, non-human identities (NHIs): service accounts, bots, APIs, and agent-AI processes are natively ungoverned, operating outside standard IAM frameworks and often without ownership, visibility, or lifecycle controls.
Information security
fromTheregister
2 months ago

Fortinet SSO patch bypass gets a separate critical CVE

Those hoping for a reprieve following last week's patch pantomime are out of luck. After users reported successful compromises of FortiCloud SSO accounts, despite being patched against an earlier flaw, the vendor confirmed there was an alternate attack path. According to a security advisory published Tuesday, that alternate path was assigned a separate vulnerability identifier (CVE-2026-24858, CVSS 9.4), and the company disabled FortiCloud SSO connections made from vulnerable versions.
Information security
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromInfoWorld
2 months ago

What drives your cloud security strategy?

Consider a fictitious company, DeltaSite, and an all-too-common scenario for rapidly expanding SaaS providers. Within months, DeltaSite embarked on an ambitious multicloud migration, deploying critical workloads across AWS, Azure, and Google Cloud. DeltaSite's board approved a seven-figure investment in the latest cloud security tools, including AI-powered monitoring and automated compliance frameworks, believing this would virtually guarantee security. Yet just six months after going live, DeltaSite suffered a major breach: A single misconfigured storage bucket exposed sensitive customer data to the public internet.
Information security
[ Load more ]