Articles about IAM

Non-human users pose a serious identity management challenge

Identity and access management (IAM) programs put a lot of emphasis on users, for the obvious reason that compromising user identities is the prime attack vector for ransomware and other threat actors. But while strengthening access and permission controls for employees, third parties and other stakeholders, too many organizations overlook a vast trove of network identities that can be equally vulnerable to attack -- the non-human identities (NHIs) that are proliferating in the cloud.

The number of non-human identities, ranging from API keys and cloud services to DevOps tools and software bots, has exploded in recent years. By some estimates they are now outnumbering human users on the network by 45-1. The tools and services that comprise non-human identities can significantly increase efficiency and productivity, but they greatly expand an organization’s attack surface if they’re not properly protected. And too many of them aren’t protected.

Continue reading

Walking the AI tightrope in IAM: finding the right balance for your organization

Identity and access management (IAM) is the foundation for control and productivity in today’s digital business environments. Ensuring the right people have the right level of access to the resources they need whenever they need them -- and that the wrong people don’t -- is a core responsibility for administrators and security teams. In a typical hybrid, distributed, multi-cloud environment, with thousands of identities to manage dynamically as the business evolves, the scale of the challenge is considerable. Enter Artificial Intelligence (AI), the seductive solution to all large-scale data-intensive challenges. AI has enormous potential for streamlining the many workloads associated with IAM and lifting the burden on stretched administrative and security teams.

We are undoubtedly experiencing an AI gold rush, but there are tensions in this brave new world. Our recent SME IT Trends report reflects this reality; while 87 percent of UK IT administrator respondents plan to implement AI initiatives in the next two years and 70 percent believe that their organization should be investing in AI, a significant minority (15 percent) say their organization is moving too fast on AI. They are in conflict with the 22 percent who think their business is moving too slowly. That amounts to well over a third of SME IT administrators who are uncomfortable with their company’s AI adoption rate.

Continue reading

Analyzing Identity and Access Management (IAM) through the lens of data management

Data

An organization's identity data today is its linchpin. This invaluable asset binds an enterprise together, orchestrating access rights, establishing a unified and accurate view of users across various channels, and empowering informed security decisions.

However, the identity infrastructure is continuously becoming more complex as businesses expand their digital landscape, bringing more users, devices, and applications within their IT environment. With this increasing complexity, poor data management can engender substantial financial losses and jeopardize sensitive user and customer data.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.