Tag: EN

Fraudulent Recruiters Target Developers with Malicious Coding Tests

  If a software developer is accustomed to receiving unsolicited messages offering lucrative remote employment opportunities, the initial approach may appear routine—a brief introduction, a well-written job description, and an invitation to complete a small technical exercise. Nevertheless, behind the…

What proactive measures can be taken for NHI lifecycle management?

How Can We Streamline NHI Lifecycle Management for Better Cloud Security? What if you could seamlessly integrate non-human identity management into your cybersecurity strategy to bolster cloud security across your organization? With digital transforms rapidly, the importance of proactive NHI…

How assured is identity security with the adoption of NHIs?

How Does Non-Human Identity Management Enhance Identity Security Assurance? How can organizations bolster their identity security assurance amidst the growing complexity of cloud environments and the proliferation of machine identities? The answer lies in adopting Non-Human Identities (NHIs). This approach…

Identity Risk Scoring Only Works If Attribution Is Defensible

Identity risk scoring has become a critical input for fraud prevention, security operations, and trust decisions. Organizations increasingly rely on risk scores to decide when to step up authentication, block access, or flag activity for investigation. But despite widespread adoption,…

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026. I’m speaking at the Personal AI Summit…