• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog / Identity and access management

Federated single sign-on: Simplifying cross-domain access

ADSelfService Plus | April 6, 2026

Federated single sign-on: Simplifying cross-domain access

As organizations expand their digital ecosystems by adopting cloud applications, enabling...

What major cyberattacks reveal about the cost of slow recovery

RecoveryManager Plus | April 1, 2026

What major cyberattacks reveal about the cost of slow recovery

Cyberattacks often succeed not because they are sophisticated but because organizations...

What is attack surface management?

ADManager Plus | March 31, 2026

What is attack surface management?

Attack surface management is the continuous process of monitoring, discovering, and...

 Best multi-factor authentication apps for enterprises in 2026

ADSelfService Plus | March 30, 2026

Best multi-factor authentication apps for enterprises in 2026

Today, organizations operate in highly distributed environments where employees access...

The NotPetya attack: What it teaches us about cyber survival

RecoveryManager Plus | March 25, 2026

The NotPetya attack: What it teaches us about cyber survival

In June 2017, the world witnessed one of the most destructive cyberattacks in history: the...

2FA vs. MFA: What’s the difference and which is more secure?

ADSelfService Plus | March 23, 2026

2FA vs. MFA: What’s the difference and which is more secure?

In modern enterprise environments, compromised credentials remain one of the top causes of...

What is segregation of duties, and why is it so important for compliance?

ADManager Plus | March 19, 2026

What is segregation of duties, and why is it so important for compliance?

Segregation of duties (SoD), also called separation of duties, is a concept which states...

Securing the gateway: Why SSH 2FA is essential

ADSelfService Plus | March 18, 2026

Securing the gateway: Why SSH 2FA is essential

In an era where remote work is the widely adopted and cloud infrastructure is crucial to...

What is a replay attack, and how do you avoid falling victim?

ADSelfService Plus | March 13, 2026

What is a replay attack, and how do you avoid falling victim?

In today’s interconnected world, cyberthreats are constantly evolving. Among these threats...

Privileged accounts: What are they and how do you manage them?

ADManager Plus | March 12, 2026

Privileged accounts: What are they and how do you manage them?

Privileged accounts are identities that have elevated permissions beyond standard user...

What is zero-factor authentication?

ADSelfService Plus | March 2, 2026

What is zero-factor authentication?

Zero-factor authentication represents the next evolution of passwordless security. It...

What birthright access is and how to use it to enforce least privilege

ADManager Plus | February 17, 2026

What birthright access is and how to use it to enforce least privilege

Birthright access refers to the predefined, minimum set of access rights a user should...

Page 1 of 54123...»Last »