Five Nines Newsletter - Volume 6

Five Nines Newsletter - Volume 6


Hey there ??

Welcome back for the latest in identity and access management trends from industry leaders, companies, and news outlets around the globe.?

IAM is always evolving so we’re here to keep you ahead of the curve with the latest developments and trends.

We hope you enjoy volume #6.

Stay Resilient ????



Trending IAM News: ??

Microsoft Putting Decentralized Identities Into Practice

No alt text provided for this image

The use of decentralized identities as an identity and access management best practice continues to gain traction.

One particular example is Microsoft’s recent announcement that they now support Verified Workplace in LinkedIn using Microsoft Entra Verified ID.

In this particular decentralized identity management use case, there are three levels of verification:

  • Level 1: Work email verification
  • Level 2: Government identity verification with partner organization Clear
  • Level 3: An available wallet for enterprises and their employees to use in order to verify employed member status on LinkedIn

While this is just one example of using decentralized identity practices in action, article author Martin Kuppinger calls it “...an important step forward towards the ubiquitous use of decentralized identities”.

Learn more here



New Okta service helps companies optimize their identity security posture

No alt text provided for this image

Identity Security Posture Management (ISPM) is a crucial component of identity and access management (IAM) that helps organizations both manage and protect their identities in a proactive manner.

It’s good news, then, that Okta Inc. recently “announced the general availability of a new service that helps companies optimize their identity security posture”, per Duncan Riley for siliconANGLE.

By leveraging Okta Customer Identity Cloud insights and data, the service should be able to help enterprises with security posture that’s either too lax or too restrictive.?

How?

Okta says those using the new service should be able to detect and respond to identity threats more quickly and easily, getting “a streamlined view of authentication events, potential incidents and threat response efficacy, allowing security teams to optimize their security posture without excessive added costs or creating an in-house solution.”

Learn More Here?



Why CrowdStrike, Cloudflare, and Okta Stocks All Popped Today

No alt text provided for this image


May 8, 2023 was a good day for CrowdStrike, Cloudflare, and Okta shareholders, as well as, of course, the organizations themselves.

Why? The Motley Fool posits that enthusiasm related to investors being bullish on Zscaler, a provider of cloud-based software for cybersecurity, spread to other cybersecurity providers, including the three mentioned above.

Out of the three services, only one had relatively major news to announce, and that was Cloudflare, which “announced it is partnering with IT infrastructure company Kyndryl (KD 0.49%) to provide services to the latter's customers.”

But while Zscaler isn’t likely to reach GAAP profitability ‘til 2027 at the earliest, Cloudflare, Okta, and CrowdStrike, are already generating positive free cash flow (FCF). What’s more, CrowdStrike is the cheapest pick when valued on its FCF.

Since CrowdStrike is also the closest to GAAP profitability, Rich Smith for the Motley Fool believes that “out of this bunch, it's probably your best stock for making a profit in cybersecurity.”

Read More Here



Speakers Corner ??

No alt text provided for this image

Before starting on a new adventure to get a fresh perspective on Information Security, I’m really grateful for Brendon and the acsense team for the opportunity to share a few thoughts with the IAM world.

It's really great to see passwordless authentication adoption on the rise, being an early advocate, however the truth is that the knowledge factor is unlikely to go away in its entirety from our lives that easily, so without reducing the benefits of passwordless. If we want to maintain the Multi part of MFA throughout all possible user flows, we eventually have to consider fallback scenarios for account recovery. And with only three main authentication categories available, them being knowledge, possession and inherence.

Could we really forgo any one factor category completely out of all our flows?

From the classic mobile device getting lost ,which in itself already feels like losing a part of ourselves, to more permanent scenarios involving natural disasters causing device trust loss. Passwordless does not mean knowledge as a factor is completely out, and the existing modalities in that category are still lacking at best.

Many solutions offer passwordless authentication for present flows, however before choosing the correct one for your needs, do consider a future where a factor might be lost.

?The past being on-boarding is worth a thought or two as well.

?As long as malicious threats continue evolving to find ways to circumvent our security controls, we will always need to also evolve our ways to gain, prove and recover trust. There is still a real need to figure out a way to work within the hardware limitations of us humans towards achieving a relatively pleasant user experience while security is maintained when authenticating someone with good ol’ mr knowledge.



Speakers Corner ??

No alt text provided for this image

???? "Hitting the Bullseye: How Mastering IAM and PAM Streamlines Your Security and Boosts Efficiency" ????

Picture a ringed target ??; you've got the wide surface area of Identity and Access Management (IAM) and the smaller, trickier bullseye of Privileged Access Management (PAM). Both are crucial for securing your organization, but knowing which one to tackle first can make all the difference.


?? Why IAM First? ??

IAM is like the outer rings of the target, encompassing the management of digital identities and access rights for all users across an organization. By addressing IAM first, you lay the foundation for a robust security system that effectively safeguards your data and resources. Implementing robust IAM policies helps you:

Streamline user onboarding and offboarding, saving valuable time.

Enhance data security, ensuring only authorized individuals access sensitive information.

Ensure compliance with regulatory requirements, protecting your business from costly fines.


?? Hone in on PAM ??

Now, imagine hitting the bullseye - PAM. This more focused target deals with managing, monitoring, and controlling privileged access for administrators and other high-level users. By zeroing in on PAM after mastering IAM, you can:

Limit the "keys to the kingdom" - preventing unauthorized access to critical systems.

Monitor and track privileged user activities, detecting and mitigating potential risks early.

Improve incident response times, minimizing the impact of security breaches.


?? The Winning Strategy ??

Approaching IAM and PAM in this sequence not only reduces the amount of effort, but also eliminates any potential duplicate efforts. By nailing IAM first, you create a solid foundation for PAM, ensuring a well-integrated and efficient security strategy.



acsense: The Enterprise IAM Resilience Platform

No alt text provided for this image

Protect Your Identity Provider (IdP) From Cyber Attacks & Human Errors

Schedule a Consultation or Demo



Podcasts ???

Podcast with NEWFORUM comparing Web3 and Decentralized Identity

Take a peek at this podcast with NEWFORUM to learn more about “the distinctions between decentralized identity, which gives individuals control over their data, and web3, which revolves around decentralized applications and blockchain technologies.”

Listen on Youtube >>?



Podcasts ???

IAM & Cyber Resilience: Breach, Recover, Improve – acsense

Muli Motola, Co-Founder and CEO at acsense discusses the critical role of identity access management and continuous access in ensuring business continuity. We also explore how to provide resilience to IT systems in the face of emerging security risks such as ransomware.

Listen here >>??



acsense Blog

No alt text provided for this image

Downtime is bad for business.

It halts productivity, creates immense financial losses, disrupts the ability to provide the customary level of service, if any service at all, to customers, and so much more…And while that much might be obvious, to many, what is far less obvious is?what to do?when faced with data loss due to system operator error or a disaster.?

The goal of any good disaster recovery plan or business continuity plan should be to enable recovery and restore business as usual as quickly as possible.

RTO and RPO are two key metrics, or KPIs, that you can use to gain an in-depth understanding of?your organization’s data limits and time frame for implementing your business continuity plan.

Read More >>



Events ??

Identiverse 2023: Identity Everywhere

Thank you to everyone who met with us and joined our VIP after-party-bus, we hope we entertained, "delivered" and educated around IAM resilience at the same time!

Until next year, stay resilient ??

No alt text provided for this image

No alt text provided for this image




Navigate 2023: Identity Security Accelerated

No alt text provided for this image

It’s important for enterprises to keep up with identity security threats and trends.

You can do just that at “Navigate 2023: Identity Security Accelerated”, a SailPoint-sponsored event happening both globally and in person in Austin, TX this October 9-12

Get event updates and information by following SailPoint’s LinkedIn page or blog.

Reserve your slot now right here.?



ForgeRock IDLive 2023

No alt text provided for this image

ForgeRock’s IDLive conference is a must-attend event that centers around “customer stories, identity innovations and training that deliver exceptional security and user experiences”.

Registration is closed for the U.S. portion of the conference, as that occurred already in Austin, TX from May 22-25, 2023.

But you can still catch the conference this year in Europe, Australia, or Asia.

Get more information here.



MEME Of The Month:???

No alt text provided for this image


Thank You For Reading!

We hope you enjoyed the June edition of the Five Nines newsletter!

Share with colleagues or follow us on?LinkedIn?for more IAM resilient insights and trends.



About acsense:

Hailing out of Tel Aviv, Israel, the team at acsense, former EMC security veterans have been exposed to the most challenging IT and security ecosystems in the world.

Our mission is to help security and risk management leaders eliminate IAM as a single point of failure from threats like ransomware, insider threats and misconfigurations caused by human error. We deliver a state-of-the-art platform for access and business continuity, serving both workforce and customer IAM needs with one seamless solution. Our platform features one-click recovery, constant data verification, periodic testing, and the ability to identify changes between Points in Time, making your IAM system resilient.

acsense is backed by Joule Ventures, Gefen Capital, Fusion and independent investors.?

To learn more,?click here?to visit our site.

要查看或添加评论,请登录

Acsense的更多文章

社区洞察

其他会员也浏览了