The latest security announcements from Amazon aim to address a wide range of security issues for businesses, including an all-in-one hand-scanning biometric system and new capabilities for its Detective security visualization tool and GuardDuty continuous monitoring solution. Amazon One Enterprise is the most novel of the company’s announcements, which were made this week at its…

Managing identities and their access permissions is becoming more complicated. Digital sprawl has led to an explosion in permissions across multicloud environments, and consistent oversight is lacking. As many as 99% of cloud permissions are going unused, and this represents a significant risk for enterprise businesses. As more organizations transition to Zero Trust security models,…

Take a moment to consider how frequently you authenticate your identity online: checking your email, logging in to your bank account, accessing cloud-based productivity tools, booking a flight, paying your taxes. We confirm our identities so many times every day that things like providing personally identifiable information and confirming a login attempt through our smartphones…

People expect nothing short of exceptional from their personal tech experiences. Yet these lofty, consumer-driven standards haven’t really applied to work-issued technology until recently. Now with ample work-from-anywhere time under their belts, workers are demanding more of the enterprise applications they use to do their jobs. And if user-centric Identity and Access Management (IAM) protections…

The funding round was led by New York-based Insight Partners, with participation from all previous investors, including Itai Tsiddon and Viola Ventures. Founded in 2014, the Tel Aviv-based PlainID provides organizations with a policy-based authorization solution that seeks to bring together IAM and cybersecurity with a real-time decision engine, all in a single, intuitive interface….

As organizations prioritize digital transformation, they are moving services to the cloud at a rapid clip. Yet when making this shift, many companies fail to make the necessary updates to their security programs and solutions to protect the new cloud perimeter. Rather than redesigning their security infrastructure for the cloud, many organizations are simply wrapping…