article thumbnail

The noodle soup of B2B IAM and third-party identities

Thales Cloud Protection & Licensing

The noodle soup of B2B IAM and third-party identities madhav Wed, 02/26/2025 - 07:29 Introduction: A messy bowl of terminology Identity management is no longer just about employees. B2B IAM The Hidden Value of Third-Party Identities. So why is B2B IAM such a tangled mess of terminology, and does it really matter?

B2B 71
article thumbnail

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

Security Affairs

A recent report, B2B IAM – The Hidden Value of Third-Party Identities , indicates that external identities outnumber traditional employees by nearly two to one. So, what’s a bit of increased risk where usernames and passwords are concerned? As companies grow, they often need to take on new B2B or B2B2X partners at a moment’s notice.

B2B 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside the DemandScience by Pure Incubation Data Breach

Troy Hunt

As I said, our IT department recently notified me that some of my data was leaked and a pre-emptive password reset was enforced as they didn't know what was leaked.  It's the old "data is the new oil" analogy that recognises how valuable our info is, and as such, there's a market for it.

article thumbnail

Hertz data breach caused by CL0P ransomware attack on vendor

Malwarebytes

In 2024, CL0P repeated this method using a zero-day exploit against Cleo, a business-to-business (B2B) tech platform provider that specializes in managed file transfer (MFT) solutions, like Cleo Harmony, VLTrader, and LexiCom. Change your password. You can make a stolen password useless to thieves by changing it.

article thumbnail

Re-Thinking B2B Cybersecurity in 2021

CyberSecurity Insiders

The constantly evolving state of cybercrime means that B2B companies need to keep altering their strategies to address modern threats. Many B2B companies will implement various cybersecurity authentication tactics only to discover that they are causing disruptions in the workflow. This way, people have to remember just one password.

B2B 93
article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. So what’s stopping us from getting rid of passwords altogether? Passwords may have been very effective securing Roman roads.

Passwords 164
article thumbnail

Identity first: Best Practices of B2B IAM

Thales Cloud Protection & Licensing

Identity first: Best Practices of B2B IAM madhav Tue, 02/27/2024 - 05:18 In today’s evolving landscape of distributed workforces, the once well-defined boundaries of the corporate network have blurred into obscurity.

B2B 83