Hydden secures $4.4 million to help security teams gain visibility over the Identity Attack Surface
Hydden, The Identity Visibility Company, today announced that it has closed $4.4 million in seed…
False Peaks: How to know when your identity management is enough
In alpine mountaineering, climbers often get heartbroken by ‘false peaks’: outcroppings that loom above the…
HyddenAugust 14, 2024
What is Identity Attack Surface Management (IASM)?
Most security professionals have long recognized the importance of thinking about cyber defense against the…
HyddenAugust 14, 2024
Unlocking Security: The Vital Role of Multi-Factor Authentication (MFA) for All Identities Everywhere
While we wait to learn more about the root cause of the breach at AT&T,…
HyddenAugust 6, 2024
Non-human Identities (NHIs) are Only a Part of the Identity Visibility Problem
Have you been hearing a lot about non-human identities (NHIs) lately? That’s because as more…
HyddenAugust 6, 2024
Exploiting Poor Identity Hygiene: A Cyber Attacker’s Perspective
Disclaimer: This blog post is written from the perspective of a cyber attacker for educational…
HyddenJuly 24, 2024
IAM Foundations: Unpacking Identity Threat Detection & Response (ITDR)
Next up on our IAM Foundations blog series: detection and response. In a world where…
HyddenJuly 24, 2024
Back to Basics: Identity and Access Management
Identity and access management (IAM) practices encompass several foundational elements. As a security leader, you…
HyddenJuly 24, 2024
United Healthcare Attack Underscores Importance of Foundational Identity Hygiene
Identity security hygiene is not a new phenomenon. Many of the largest companies in the…
HyddenJuly 24, 2024
Recent Comments