#sso-tools

[ follow ]
#cybersecurity
fromTNW | Data-Security
4 weeks ago
Information security

The passwordless future is years away.

The cybersecurity industry still heavily relies on legacy passwords despite the promise of passwordless solutions.
DevOps
fromSecuritymagazine
16 hours ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
Artificial intelligence
fromThe Hacker News
5 hours ago

Toxic Combinations: When Cross-App Permissions Stack into Risk

Moltbook's database exposure revealed significant security risks, including unencrypted credentials and API tokens, due to poor oversight of AI agent integrations.
Mental health
fromSmashing Magazine
2 days ago

Session Timeouts: The Overlooked Accessibility Barrier In Authentication Design - Smashing Magazine

Poor session timeouts create significant accessibility barriers for users with disabilities, impacting their online experiences and tasks.
EU data protection
fromwww.independent.co.uk
5 days ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
#zoom
Privacy technologies
fromTechCrunch
4 days ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
Privacy technologies
fromTechCrunch
4 days ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
Information security
fromSecurityWeek
5 hours ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

SBOMs and VEX statements fail to enhance software supply chain security due to poor decision-making and inconsistent interpretation of available data.
fromComputerworld
6 days ago

Microsoft Teams cheat sheet: How to get started

Using the Mic button and dropdown, you can select your audio devices, including your speaker volume. In most cases, Teams selects this correctly, but if you want to switch to a Bluetooth or USB headset, for instance, choose the right device from the Speaker and Microphone section of the right pane.
Remote teams
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#ai
fromMedium
1 day ago
Artificial intelligence

How to mitigate the risk of AI implementation in enterprise environments

fromSecurityWeek
3 weeks ago
Artificial intelligence

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromTechzine Global
1 week ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Artificial intelligence
fromSecurityWeek
3 weeks ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Privacy technologies
fromComputerWeekly.com
2 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
DevOps
fromwww.bankingdive.com
2 days ago

How proactive DEX strengthens IT compliance in financial services

Proactive DEX management helps financial services organizations address compliance challenges by continuously monitoring and improving the digital workplace.
Privacy technologies
fromnews.bitcoin.com
5 days ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
#ai-governance
Privacy technologies
fromThe Verge
6 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Information security
fromBusiness Matters
5 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
#identity-verification
#okta
#iam
Information security
fromInfoWorld
1 week ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
1 week ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
1 week ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerworld
1 week ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromComputerWeekly.com
6 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
EU data protection
fromTNW | Offers
3 weeks ago

Automate ISO 27001, SOC 2, & DORA compliance from 2,999/year

Compliance is essential, but traditional methods are inefficient; automation can significantly reduce workload and improve effectiveness.
Information security
fromInfoWorld
1 week ago

Microsoft's reauthentication snafu cuts off developers globally

Microsoft is addressing a reauthentication issue that has blocked some independent software vendors from accessing its systems.
#password-managers
Apple
fromZDNET
1 month ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Apple
fromZDNET
1 month ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
#identity-management
Information security
fromThe Hacker News
2 weeks ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Healthcare
fromNextgov.com
1 month ago

CMS touts early uses of new biometric verification tools for Medicare.gov

CMS launched modern identity verification options (Login.gov, ID.me, CLEAR) on Medicare.gov, with 25% of users adopting them within five to six days and 60% of new accounts using these credentials.
Information security
fromThe Hacker News
2 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
fromInfoQ
1 month ago

Platforms for Secure API Connectivity With Architecture as Code

Building APIs is so simple. Caveat, it's not. Actually, working with tools with no security, you've got a consumer and an API service, you can pretty much get that up and running on your laptop in two or three minutes with some modern frameworks. Then, authentication and authorization comes in. You need a way to model this.
Web frameworks
#ai-security
Information security
fromTechRepublic
3 weeks ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Privacy technologies
fromAzure DevOps Blog
1 month ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
Information security
fromTNW | Offers
4 weeks ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
#ai-agent-security
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTechzine Global
1 month ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTheregister
1 month ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTechzine Global
1 month ago

1Password Launches Unified Access Pro for AI Agents

1Password launches Unified Access Pro to manage credentials for people, AI agents, and machine identities with device-level visibility and just-in-time credential delivery.
Information security
fromTheregister
1 month ago

Microsoft Intune: Lock it down, warn feds after Stryker

Iran-linked Handala attacked Stryker using compromised Microsoft Intune to wipe devices; CISA urges companies to implement least privilege access controls and follow Microsoft security best practices.
Privacy technologies
fromZDNET
1 month ago

I switched password managers without losing a single login - here's how

Switching password managers involves exporting passwords to CSV and importing them into a new app, then reviewing settings before deleting the old manager.
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Privacy technologies
fromTechzine Global
1 month ago

Windows Hello gets passkey support for Entra accounts

Microsoft is introducing passkey support with Windows Hello for Microsoft Entra sign-in, enabling passwordless authentication resistant to phishing attacks on Windows devices.
Information security
fromZDNET
1 month ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Information security
fromTechzine Global
1 month ago

Red Access turns any firewall into a full SSE platform

Red Access launches firewall-native SSE that adds Security Service Edge capabilities to existing firewalls without requiring replacement, agents, or browser changes, deploying up to 80 percent faster than traditional SSE platforms.
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromthehackernews.com
2 months ago

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

Continuous identity observability uncovers embedded credentials, application-level authorization, and unmanaged identity paths to eliminate Identity Dark Matter and reduce unseen identity risk.
Information security
fromSecuritymagazine
1 month ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
Information security
fromTheregister
1 month ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromComputerworld
2 months ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
Information security
fromTechzine Global
2 months ago

Okta tackles shadow AI with new agent discovery tools

Agent Discovery provides visibility into unauthorized AI agents by detecting OAuth connections and mapping unsanctioned AI tool access and permissions to corporate apps.
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
fromLogRocket Blog
2 months ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromTheregister
2 months ago

FortiGate SSO bug still exploitable despite December patch

Attackers have found a new way to bypass Fortinet's December patch for FortiCloud SSO, enabling compromise of updated FortiGate devices and exfiltration of configurations.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
fromThe Hacker News
2 months ago

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it's continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.
Information security
Information security
fromSecurityWeek
2 months ago

Microsoft Moves Closer to Disabling NTLM

NTLM authentication will be disabled by default in upcoming Windows Server and client releases, requiring explicit re-enablement and migration to Kerberos.
fromTheregister
2 months ago

Fortinet SSO patch bypass gets a separate critical CVE

Those hoping for a reprieve following last week's patch pantomime are out of luck. After users reported successful compromises of FortiCloud SSO accounts, despite being patched against an earlier flaw, the vendor confirmed there was an alternate attack path. According to a security advisory published Tuesday, that alternate path was assigned a separate vulnerability identifier (CVE-2026-24858, CVSS 9.4), and the company disabled FortiCloud SSO connections made from vulnerable versions.
Information security
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
[ Load more ]