Update Note Due to the recent events at MGM, which included the compromise of MGM’s Okta tenant, and the surge in attacks of Okta Admins, we have updated the threat-hunting article, adding a few relevant queries to increase visibility surrounding
Identity is a topic philosophers have struggled with for years. Identity as a concept spawns many smaller questions, such as “What makes you who you are?”. In the realm of cybersecurity, identity is just as groundbreaking and raises comparable concerns
Azure Active Directory (Entra ID) stands as one of the most popular and widely-used cloud-based identity and access management services provided by Microsoft. It serves as a comprehensive solution for managing user identities and controlling access to a diverse range
Imagine having the power to scrutinize user permissions with the finesse of a master locksmith, uncovering hidden backdoors and granting access only to the deserving. Sounds great, right? However, to do that, we need to first start our process with
Azure Identity Protection is the enigmatic sentinel of the Microsoft realm. Understanding the inner workings of Azure Identity Security Protection is essential to any information security officer, and will unlock the keys to an effective user risk policy. Unsurprisingly, cyber
Most enterprises recognize IAM strategies as an effective way to mitigate security challenges, but turning intention into action is another story. Why do some businesses still allow their employees to use ‘12345’ as a password despite knowing the financial and
Rezonate Announces Mid-Market Identity-Security Solution. Learn more