atlas news
    
Security Boulevard
15  décembre     00h02
CIAM vs IAM: Comparing Customer Identity and Identity Access Management
MojoAuth - Advanced Authentication & Identity Solutions    Understand the key differences between CIAM and IAM. Learn which identity management solution is right for your business for customer and employee access. The post CIAM vs IAM: Comparing Customer Identity and Identity Access Management appeared first on Security Boulevard.
14  décembre     22h00
Infosecurity.US Wishes All A Happy Hanukkah
Marc Handelman    United States of America’s NASA Astronaut Jessica Meir’s Hanukkah Wishes from the International Space Station: Happy Hanukkah to all those who celebrate it on Earth (Originally Published in 2019) United States of America’s NASA Astronaut Jessica Meir Permalink The post Infosecurity.US Wishes...
    22h00
What makes Non-Human Identities crucial for data security
Alison Mack    Are You Overlooking the Security of Non-Human Identities in Your Cybersecurity Framework? Where bustling with technological advancements, the security focus often zooms in on human authentication and protection, leaving the non-human counterparts Non-Human Identities (NHIs) in the shadows. The...
    22h00
How do I implement Agentic AI in financial services
Alison Mack    Why Are Non-Human Identities Essential for Secure Cloud Environments? Organizations face a unique but critical challenge: securing non-human identities (NHIs) and their secrets within cloud environments. But why are NHIs increasingly pivotal for cloud security strategies? Understanding Non-Human...
    22h00
What are the best practices for managing NHIs
Alison Mack    What Challenges Do Organizations Face When Managing NHIs? Organizations often face unique challenges when managing Non-Human Identities (NHIs). A critical aspect that enterprises must navigate is the delicate balance between security and innovation. NHIs, essentially machine identities, require...
    22h00
How can Agentic AI enhance our cybersecurity measures
Alison Mack    What Role Do Non-Human Identities Play in Securing Our Digital Ecosystems? Where more organizations migrate to the cloud, the concept of securing Non-Human Identities (NHIs) is becoming increasingly crucial. NHIs, essentially machine identities, are pivotal in maintaining robust cybersecurity...
    16h00
NDSS 2025 Secret Spilling Drive: Leaking User Behavior Through SSD Contention
Marc Handelman    Session 5D: Side Channels 1 Authors, Creators & Presenters: Jonas Juffinger (Graz University of Technology), Fabian Rauscher (Graz University of Technology), Giuseppe La Manna (Amazon), Daniel Gruss (Graz University of Technology) PAPER Secret Spilling Drive: Leaking User Behavior through SSD...
    10h38
2025: The Year Cybersecurity Crossed the AI Rubicon
Lohrmann on Cybersecurity    How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why. The post 2025: The Year Cybersecurity Crossed the AI Rubicon appeared first on Security Boulevard.
    09h30
LGPD (Brazil)
Deborah Erlanger    What is the LGPD (Brazil)? The Lei Geral de Proteçà o de Dados Pessoais (LGPD), or General Data Protection Law (Law No. 13.709 2018), is Brazil’s comprehensive data protection framework, inspired by the European Union’s GDPR. It regulates the collection, use, storage, and sharing of personal data,...
13  décembre     22h00
Why are companies free to choose their own AI-driven security solutions?
Alison Mack    What Makes AI-Driven Security Solutions Crucial in Modern Cloud Environments? How can organizations navigate the complexities of cybersecurity to ensure robust protection, particularly when dealing with Non-Human Identities (NHIs) in cloud environments? The answer lies in leveraging AI-driven...