Identity and Access Management

Okta Adds Free Developer Edition to AppSec Service
Okta this week lowered the barrier to adoption of DevSecOps best practices by making available an Okta Starter Developer Edition to enable developers to embed Okta authentication, authorization and user management capabilities ...

JumpCloud Brings Zero-Touch Provisioning to the Mac
JumpCloud today announced it is adding a zero-touch enrollment for Macs capability to its cloud directory platform that will also be extended over time to applications. Greg Keller, JumpCloud CTO, said this ...

Rewind Acquires BackHub to Protect GitHub Repositories
Rewind, a provider of a software-as-a-service (SaaS) platform for backing up cloud services, today announced it has acquired BackHub to gain control of a platform for backing up GitHub repositories. Based in ...

OpenAPI Specification: Perception vs. Reality
The OpenAPI Specification (OAS) (formerly known as the Swagger specification) provides a way to describe and document REST APIs and their components. It includes details on endpoints, their operations, parameters needed for ...

DevSecOps Implementation: EDR/XDR
We mentioned host intrusion detection and network intrusion detection in an earlier blog, and mentioned firewalls a couple of times in passing. Let’s delve a bit into the history to understand how ...

Quest Software Expands MDM Cloud Reach
Quest Software today extended the reach of its mobile device management (MDM) service to provide more granular control over mobile devices and applications in addition to being able to track their location ...

Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management
This may well be the decade that the data center’s reign falls, and multi-clouds prevail. A multi-cloud strategy, which incorporates cloud services from multiple vendors, promises plenty of benefits, including improved resilience ...

5 Password Policies to Up Your Security
Complex passwords can save users from being hacked—any IT admin will tell you that. Plus, countless studies and articles on password security have been published about why password policies are vital to ...

SSH Key Management and Your Organization
It always starts out the same way: a few machines, a few users and a few SSH keys to manage. You manually copy their keys (and your own) to the appropriate machines ...

DevOps Chat: Identity Management with ForgeRock’s Peter Barker
Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people ...

DevOps and the Identity Conundrum
"Who am I?" It is perhaps the most basic question of consciousness. The answer could be subdivided by aspects of my life story … my career, my family, my beliefs, my education ...