.

Loading

Weekly Newsletter

Sunday, September 21, 2025

Features of the week

Introducing a Dedicated Route to Uncover AI-caused API Risks

Salt Security, the leader in API security, has officially announced the launch of first ever solution to secure all actions that AI agents take within an enterprise. To understand the significance of such a development, we must take into account...

Banking Transformation Summit 2025 Unveils Full Agenda

Charlotte, NC – August 21, 2025. The future of banking is taking center stage. Banking Transformation Summit is set to return to the Charlotte Convention Center on November 17-18, 2025, bringing together over 800 banking and fintech leaders to...

Understanding the Reality of Modern Day Fraud and the Triggers Behind It

LexisNexis® has officially published the results from its latest report named LexisNexis® True Cost of Fraud™ Study 2025 North America. Going by the available details, this particular report goes on to showcase that 44% of North American financial institutions (FIs)...

Mitigating the Risks That Threaten to Seep in Through a Healthcare Organization’s Email Inbox

Paubox, the leading provider of HIPAA compliant email security, has officially announced the launch of its Inbound Email Security solution, which happens to be a AI-powered inbound email security solution capable of improving upon rule-based filters with generative artificial...

Featured Vendors

Featured Insights

Why Your Authentication Controls Are Creating Audit Findings (And How to Fix Them)

Your organization has implemented comprehensive password policies, conducts regular security awareness training, and maintains detailed access logs. Yet identity-related incidents continue appearing in your risk registers, audit findings reference authentication weaknesses, and regulatory examinations increasingly focus on credential management...

Foundations for the Future

Digital Identity is fundamental to digital strategy—not just as a (the!) key component in keeping people, data, systems, and organisations, secure; nor just as the way to ensure that we meet our sectoral, regional, national and international regulatory compliance...

Why Identity is the only perimeter that matters in cybersecurity?

Let’s start with the history of information security. Information/data used to be stored in storage systems in our datacenters. To access/hack the data or bring down the systems to cause harm, bad actors had two entry points. One is the...

The Bedrock of IAM: Why Policy and Control Define Success

For over two decades, I've had a front-row seat for the evolution of identity and access management (IAM). I've seen organizations launch ambitious IAM modernization projects, only to watch them falter. In my years of helping clients develop identity...