Identity management and information security news for the week of November 10; Okta, Fortra, Living Security, etc.

0

The editors of Solutions Review have compiled this list of the most notable identity management and information security news stories for the week of November 10. This list includes identity management and information security vendors such as Okta, Fortra, Living Security, etc.

Keeping tabs on all the most relevant identity management and information security news can be a daunting task. Accordingly, our editorial team aims to provide a summary of the top headlines from the past month, in this space. Solutions Review editors will curate news on vendor products, mergers and acquisitions, venture capital funding, talent acquisition, and other notable identity management and security news stories some information.

News of the week of November 10 on identity management and information security


Okta introduces Okta Customer Identity Cloud

This week, Okta, an identity provider, unveiled Okta Customer Identity Cloud, an easy-to-implement and customizable customer identity solution that helps organizations streamline sign-in and sign-in on any device, stack or platform, for better customer acquisition and retention, a better experience, and a more comprehensive view of users. Okta Customer Identity Cloud, including new use cases for consumer apps and SaaS apps, is available now. For SaaS applications, enhancements for Okta Workforce Enterprise Connection and Organizations are available today for self-service Enterprise and B2B customers. New features for consumer applications will be available by the end of Q2 2023, with support for highly regulated identity as an enterprise add-on.

Read on to find out more.

Veza Launches Authorization Platform for Data on AWS Marketplace

Veza, a data security company, announced that its core authorization platform is now available for purchase on AWS Marketplace, a digital catalog containing thousands of software listings from independent software vendors (ISVs) that make it easy to find, test, buy and deploy. software that runs on Amazon Web Services (AWS). Veza has also joined the AWS Partner Network (APN) to provide secure, scalable, and reliable services to organizations operating on AWS and has earned the AWS Security Competency in the Identity & Access Management category.

Read on to find out more.

Medibank says hacker accessed data of 9.7 million customers and refuses to pay ransom

Medibank Private Ltd (MPL.AX), Australia’s largest health insurer, said on Monday that no ransom would be paid to the criminal responsible for a recent data theft, in which around 9.7 million customer data current and former have been compromised. Highlighting the findings of the company’s investigation to date, Medibank has confirmed that the name, date of birth, address, telephone number and email addresses of approximately 9.7 million customers current and former were accessed during the data theft.

Read on to find out more.

HelpSystems is now Fortra

HelpSystems has announced that it has become Fortra. With a stronger line of defense from a single vendor, organizations of all kinds can turn to Fortra to increase security maturity while reducing the burdens on day-to-day productivity. Over the past few years, Fortra has more than 3,000 employees with offices in 18 countries and more than 30,000 customers worldwide. As part of this evolution, the company has focused on cybersecurity and automation, building a portfolio with capabilities in data security, infrastructure protection and managed security services. These acquisitions include Alert Logic, Digital Guardian, Cobalt Strike, Tripwire, Digital Defense, Terranova Security, Agari, PhishLabs, Core Security, GoAnywhere, Titus and other well-known software and service providers.

Read on to find out more.

REPORT: “Organizations Struggle to Achieve PKI Maturity as the Digital Security Landscape Evolves”

The study found that while the primary use cases for PKI are still of the traditional variety, such as TLS/SSL, securing VPN and private networks, and digital signing, it is the regulatory landscape and new use cases – such as cloud-based and IoT services – that are driving PKI adoption. For example, IT security teams report growing demand for public key infrastructure due to the regulatory environment – ​​ranked by 31% of respondents compared to 24% the previous year – and BYOD and management internal devices, which more than doubled from 11% in 2021 to 24% in 2022. Yet organizations continue to struggle to apply the resources needed to effectively manage their PKI implementations, 64% of respondents citing insufficient resources, lack of skills and lack of clear ownership as the top three challenges to enabling applications to use public key infrastructure – up from 51% in last year’s survey . Highlighting the need for resources, nearly half (48%) identified a “lack of application visibility that will depend on PKI,” rising from 34% in 2021. Similarly, another leap is occurred with 35% of respondents identifying requirements that were too fragmented. or inconsistent, compared to 28% in 2021.

Read on to find out more.

Keyo Launches First Biometric Identity Network Powered by Palm Scanning Technology

Keyo, a biometric identity company, announced the launch of the Keyo Network, a global biometric identity system with the most powerful palm scanner and software platform in the industry. Keyo lets anyone verify who they are and access what’s theirs with a contactless scan of their hand, giving people the power to open doors, pay in stores, redeem tickets, and more without the need for phones, fobs, cards or keys. The Keyo Network is designed to create a convenient and consistent experience for people across different companies, countries, and use cases. It is powered by patented hardware and software that maps and encrypts unique palm patterns and can scale to billions of users.

Read on to find out more.

OUT OF STEALTH: New SURF Zero-Trust Enterprise Browser

The new zero-trust, identity-centric SURF enterprise browser strengthens organizational security by providing the critical visibility needed to prevent attacks while simultaneously ensuring the privacy of each user. The platform streamlines collaboration and provides easy and secure access to apps and data for managed and unmanaged (BYOD) devices. The platform already has deep integration with Okta’s identity and access management platform (IDP) technology.

Read on to find out more.

VetsinTech rewards companies for their commitment to veterans

VetsinTech, a national nonprofit organization dedicated to supporting veterans through technology programs and opportunities in education, employment and entrepreneurship, announced its award winners. annual. Each year, VetsinTech recognizes companies that have made a significant impact on opportunities for veterans in education, employment and entrepreneurship throughout 2022. As part of its annual fundraising gala, “Vets 2.0 – Beyond the Transition”, VetsinTech has recognized several organizations and individuals with its “Beyond the Call of Duty Awards” which recognize outstanding commitment to supporting veterans.

Read on to find out more.

Solution review secures Wayne Dorris, Kimberly Biddings and Steve Benton for panels

Insight Jam BadgeWith the 4th annual InfoSec Insight Jam fast approaching, Solutions Review is pleased to announce that Wayne Dorris of Axis Communications, Kimberly Biddings of BIO-key, and cybersecurity expert and author Deb Radcliff are all scheduled to appear on the 12 December as part of an exclusive executive roundtable.

Read on to find out more.

Living Security partners with SpyCloud

Living Security, a human risk management platform, this week announced a partnership with SpyCloud, a cybercrime analytics provider, to better identify human risk segments within organizations and help security managers create a proactive plan to mitigate attacks. Living Security’s Unify Human Risk Management Platform now includes SpyCloud’s Identity Risk Engine, which provides risk assessments and Key Risk Indicators (KRIs) based on analysis of over 300 billion assets recovered from data breaches and malware victim logs traded in the criminal underground. KRIs link email addresses, usernames, passwords, and PII to employees’ exposed online people, giving security teams a more complete picture of individuals’ security hygiene, as well as details on the scope, recency and severity of their darknet exposures. Through this partnership, organizations will be able to better identify the most vulnerable segments within their workforce, including employees whose accounts and credentials are compromised, so they can better mitigate exposure. human risk and measure their behavior over time.

Read on to find out more.


mike costello
Latest posts from Mike Costello (see everything)
Share.

Comments are closed.