{"id":1709333,"date":"2017-10-20T01:25:20","date_gmt":"2017-10-20T05:25:20","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1709333&#038;preview_id=1709333"},"modified":"2018-01-11T02:07:42","modified_gmt":"2018-01-11T07:07:42","slug":"identity-management","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/identity-management\/","title":{"rendered":"Identity Management"},"content":{"rendered":"<div id=\"pl-1709333\"  class=\"panel-layout\" ><div id=\"pg-1709333-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1709333-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1709333-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1709333-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Identity Management<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1709333-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"cc7e1f7fmh\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Interpol Operation Synergia ransomware phishing\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037360\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"North Korea IT worker scam\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#cc7e1f7fmh\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#cc7e1f7fmh\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-aa5c1d482y\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1709333-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037657\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Interpol Operation Synergia ransomware phishing\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">November 27, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/africa-cybersecurity\/' title='Africa Cybersecurity' class='pt-cv-tax-africa-cybersecurity'>Africa Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/interpol\/' title='Interpol' class='pt-cv-tax-interpol'>Interpol<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-scams\/' title='online scams' class='pt-cv-tax-online-scams'>online scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed \"Operation Serengeti\" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037607\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-supply-chain-attack\/' title='software supply chain attack' class='pt-cv-tax-software-supply-chain-attack'>software supply chain attack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/starbucks\/' title='Starbucks' class='pt-cv-tax-starbucks'>Starbucks<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037624\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Screenshot of Aembit Workload IAM Platform main console\" title=\"\" data-cvpsrc=\"https:\/\/aembit.io\/wp-content\/uploads\/2024\/11\/image2-1024x592.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/\" class=\"_self cvplbd\" target=\"_self\" >Secure Workload Access in Minutes with Aembit\u2019s New QuickStart Guide<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/kevin-sapp\/\" rel=\"author\">Kevin Sapp<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:23:02-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/access\/' title='access' class='pt-cv-tax-access'>access<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/resources\/' title='Resources' class='pt-cv-tax-resources'>Resources<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/workloads\/' title='workloads' class='pt-cv-tax-workloads'>workloads<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">3 min readThis step-by-step resource helps you deploy workloads, configure policies, and explore Aembit\u2019s approach to securing non-human identities. The post Secure Workload Access in Minutes with Aembit\u2019s New QuickStart Guide appeared ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Aembit&feed_id=1038&blog_url=https:\/\/aembit.io\/\">Aembit<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037569\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Understanding Privileged Access Management (PAM): A Comprehensive Guide\" title=\"\" data-cvpsrc=\"https:\/\/guptadeepak.com\/content\/images\/2024\/11\/Privileged-Access-Management--PAM--Architecture-1.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/\" class=\"_self cvplbd\" target=\"_self\" >Understanding Privileged Access Management (PAM): A Comprehensive Guide<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/deepak-gupta-tech-entrepreneur-cybersecurity-aut\/\" rel=\"author\">Deepak Gupta - Tech Entrepreneur, Cybersecurity Author<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:29:49-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/access-control\/' title='Access control' class='pt-cv-tax-access-control'>Access control<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-security\/' title='Data Security' class='pt-cv-tax-data-security'>Data Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/pam\/' title='PAM' class='pt-cv-tax-pam'>PAM<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privileged-access-management\/' title='Privileged access management' class='pt-cv-tax-privileged-access-management'>Privileged access management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privileged-accounts\/' title='Privileged Accounts' class='pt-cv-tax-privileged-accounts'>Privileged Accounts<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Privileged Access Management (PAM) is crucial in today's threat landscape. This guide explores what PAM is, why it's essential for your organization, and how it safeguards against unauthorized access. Learn about best ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher&feed_id=978&blog_url=https:\/\/guptadeepak.com\/\">Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037472\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/VyttgAKIadI\/hqdefault.jpg\" \/><iframe title=\"Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/VyttgAKIadI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" class=\"_self cvplbd\" target=\"_self\" >Deepfake Fraud, Data Brokers Tracking Military Personnel<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/tom-eston\/\" rel=\"author\">Tom Eston<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T00:00:33-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/biometrics\/' title='biometrics' class='pt-cv-tax-biometrics'>biometrics<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-security\/' title='Cyber Security' class='pt-cv-tax-cyber-security'>Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-threat\/' title='cyber threat' class='pt-cv-tax-cyber-threat'>cyber threat<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-brokers\/' title='Data Brokers' class='pt-cv-tax-data-brokers'>Data Brokers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-privacy\/' title='Data Privacy' class='pt-cv-tax-data-privacy'>Data Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/deepfake\/' title='deepfake' class='pt-cv-tax-deepfake'>deepfake<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/deepfakes\/' title='deepfakes' class='pt-cv-tax-deepfakes'>deepfakes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/digital-privacy\/' title='Digital Privacy' class='pt-cv-tax-digital-privacy'>Digital Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/episodes\/' title='Episodes' class='pt-cv-tax-episodes'>Episodes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fraud\/' title='Fraud' class='pt-cv-tax-fraud'>Fraud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/germany\/' title='Germany' class='pt-cv-tax-germany'>Germany<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/information-security\/' title='Information Security' class='pt-cv-tax-information-security'>Information Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/infosec\/' title='Infosec' class='pt-cv-tax-infosec'>Infosec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/location\/' title='Location' class='pt-cv-tax-location'>Location<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/location-data\/' title='location data' class='pt-cv-tax-location-data'>location data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/military\/' title='military' class='pt-cv-tax-military'>military<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/pirates\/' title='pirates' class='pt-cv-tax-pirates'>pirates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcast\/' title='Podcast' class='pt-cv-tax-podcast'>Podcast<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcasts\/' title='Podcasts' class='pt-cv-tax-podcasts'>Podcasts<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privacy\/' title='Privacy' class='pt-cv-tax-privacy'>Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privateers\/' title='Privateers' class='pt-cv-tax-privateers'>Privateers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/scams\/' title='Scams' class='pt-cv-tax-scams'>Scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/strava\/' title='Strava' class='pt-cv-tax-strava'>Strava<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/surveillance\/' title='surveillance' class='pt-cv-tax-surveillance'>surveillance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/technology\/' title='technology' class='pt-cv-tax-technology'>technology<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/weekly-edition\/' title='Weekly Edition' class='pt-cv-tax-weekly-edition'>Weekly Edition<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Shared Security Podcast&feed_id=546&blog_url=https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037459\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-prevent-evilginx-attacks-targeting-entra-id\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"Evilginx Attack Demo: How Hackers Bypass Microsoft MFA\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/WP4ZbC0tyUI\/hqdefault.jpg\" \/><iframe title=\"Evilginx Attack Demo: How Hackers Bypass Microsoft MFA\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/WP4ZbC0tyUI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-prevent-evilginx-attacks-targeting-entra-id\/\" class=\"_self cvplbd\" target=\"_self\" >How to Prevent Evilginx Attacks Targeting Entra ID<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/peter-stromquist-staff-solutions-engineer-hypr\/\" rel=\"author\">Peter Stromquist, Staff Solutions Engineer, HYPR<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T14:00:01-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/authentication\/' title='Authentication' class='pt-cv-tax-authentication'>Authentication<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fido\/' title='FIDO' class='pt-cv-tax-fido'>FIDO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/passkeys\/' title='Passkeys' class='pt-cv-tax-passkeys'>Passkeys<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/passwordless\/' title='passwordless' class='pt-cv-tax-passwordless'>passwordless<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-bulletin\/' title='security bulletin' class='pt-cv-tax-security-bulletin'>security bulletin<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/technical-articles\/' title='Technical Articles' class='pt-cv-tax-technical-articles'>Technical Articles<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems. One particularly insidious threat is Evilginx, a phishing framework designed to bypass traditional multi-factor authentication (MFA) ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=HYPR Blog&feed_id=1059&blog_url=https:\/\/blog.hypr.com\">HYPR Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037206\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-crucial-influence-of-human-factors-in-security-breaches\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"human, security breach, FBI Palantir misconfiguration pandemic\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Human-Error-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-crucial-influence-of-human-factors-in-security-breaches\/\" class=\"_self cvplbd\" target=\"_self\" >The Crucial Influence of Human Factors in Security Breaches<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/prashant-ketkar\/\" rel=\"author\">Prashant Ketkar<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T05:34:57-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/breaches\/' title='breaches' class='pt-cv-tax-breaches'>breaches<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/human-error\/' title='Human Error' class='pt-cv-tax-human-error'>Human Error<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/human-factor\/' title='human factor' class='pt-cv-tax-human-factor'>human factor<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/mfa\/' title='MFA' class='pt-cv-tax-mfa'>MFA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/remote-browser-isolation\/' title='remote browser isolation' class='pt-cv-tax-remote-browser-isolation'>remote browser isolation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/zero-trust\/' title='zero trust' class='pt-cv-tax-zero-trust'>zero trust<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The hard truth is that security breaches often happen because of human mistakes from simple, everyday actions. It's not just employees unknowingly using unsecured Wi-Fi \u2013 it's phishing, weak passwords and a ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037128\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/modern-cyber-attacks-understanding-the-threats-and-building-robust-defenses\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses\" title=\"\" data-cvpsrc=\"https:\/\/guptadeepak.com\/content\/images\/2024\/11\/Screenshot-2024-11-17-at-5.18.08-PM.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/modern-cyber-attacks-understanding-the-threats-and-building-robust-defenses\/\" class=\"_self cvplbd\" target=\"_self\" >Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/deepak-gupta-tech-entrepreneur-cybersecurity-aut\/\" rel=\"author\">Deepak Gupta - Tech Entrepreneur, Cybersecurity Author<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:58:49-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cyberattacks\/' title='cyberattacks' class='pt-cv-tax-cyberattacks'>cyberattacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/digital-identity\/' title='Digital Identity' class='pt-cv-tax-digital-identity'>Digital Identity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/password\/' title='Password' class='pt-cv-tax-password'>Password<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/verified-credentials\/' title='verified credentials' class='pt-cv-tax-verified-credentials'>verified credentials<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher&feed_id=978&blog_url=https:\/\/guptadeepak.com\/\">Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1709333\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"afd54388ad3490ca1dbff6706d00c08b\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-e3c90678og\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Identity Management<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1709333","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identity Management - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Best practices for managing access to resources for IT system by associating user rights and restrictions with the established identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/identity-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Management\" \/>\n<meta property=\"og:description\" content=\"Identity Management\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/identity-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/identity-management\/\",\"url\":\"https:\/\/securityboulevard.com\/identity-management\/\",\"name\":\"Identity Management - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2017-10-20T05:25:20+00:00\",\"dateModified\":\"2018-01-11T07:07:42+00:00\",\"description\":\"Best practices for managing access to resources for IT system by associating user rights and restrictions with the established identity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/identity-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/identity-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/identity-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity Management - Security Boulevard","description":"Best practices for managing access to resources for IT system by associating user rights and restrictions with the established identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/identity-management\/","og_locale":"en_US","og_type":"article","og_title":"Identity Management","og_description":"Identity Management","og_url":"https:\/\/securityboulevard.com\/identity-management\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:07:42+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/identity-management\/","url":"https:\/\/securityboulevard.com\/identity-management\/","name":"Identity Management - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2017-10-20T05:25:20+00:00","dateModified":"2018-01-11T07:07:42+00:00","description":"Best practices for managing access to resources for IT system by associating user rights and restrictions with the established identity.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/identity-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/identity-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/identity-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Identity Management"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7aFT","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1709333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1709333"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1709333\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1709333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}