Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Retail Threat Group Shifts Focus to Insurance Industry

June 16, 2025

Exposed Developer Secrets Are a Big Problem. AI is Making Them Exponentially Worse

June 16, 2025

Cyber Threats Shift: Hackers Target U.S. Insurance Firms

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Security Posture Management and Passwordless Enhancements Expand RSA Identity Security Platform
Solutions & Tech

Security Posture Management and Passwordless Enhancements Expand RSA Identity Security Platform

Staff WriterBy Staff WriterJune 5, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


RSA, the security-first identity leader, announced new Identity Security Posture Management (ISPM) and enhancements to the industry’s only complete, enterprise-grade passwordless identity platform at Infosecurity Europe 2025. These innovations will help enterprises proactively find and resolve security risks across hybrid and cloud environments and simplify users’ log-in processes with advanced, phishing-resistant security capabilities.

“For identity teams overwhelmed by data, the new AI-powered dashboards from RSA provide the proactive information they need to prioritize actions and enhance their security,” said RSA Chief Product and Technology Officer Jim Taylor.

RSA Announces New RSA Governance & Lifecycle ISPM Capabilities

Built into the RSA Governance & Lifecycle identity governance and administration (IGA) solution, the new ISPM features from RSA address critical cybersecurity risks that result from cloud computing, remote work, and the growth of human and non-human identities.

Cyber Technology Insights : IP Fabric Enhances Security Posture Assurance with Firewall Discovery and Simulation

Increasingly complex IT environments have made it impossible for organisations to gain a comprehensive understanding of their identity posture using traditional approaches to identity and access management, leaving them vulnerable to attacks, fines, and other risks. To adapt to this evolving threat landscape, organisations are turning to ISPM, a new cybersecurity framework that complements traditional IGA functions by stressing comprehensive visibility, continuous risk assessment, and automated remediation of identity-related vulnerabilities.

Combined with leading RSA Governance & Lifecycle IGA capabilities, RSA ISPM innovations help organisations proactively reduce their identity attack surface. The new AI-powered dashboards provide organisations with comprehensive visibility into their identity ecosystem; deliver proactive insights on policy violations, excessive entitlements, orphaned accounts, and other critical risks; and deliver clear, actionable insights and recommendations for admins, business leaders, and executives. The new RSA Governance & Lifecycle ISPM capabilities will be generally available in Q3 2025.

“Reactive identity security capabilities simply aren’t sufficient for today’s threats, which demand solutions that can proactively find, prioritize, and resolve identity risks,” said RSA CEO Rohit Ghai. “Government departments, banks, healthcare, energy, and other security-first organisations need a unified identity platform—including strong access security, enterprise-grade passwordless authentication, governance, and lifecycle workflows operating in an ISPM framework—to stop cyberattacks, stay compliant, and accelerate productivity.”

“For identity teams overwhelmed by data, the new AI-powered dashboards from RSA provide the proactive information they need to prioritize actions and enhance their security,” said RSA Chief Product and Technology Officer Jim Taylor. “With more threats, higher compliance expectations, and shrinking cybersecurity budgets, the new RSA Governance & Lifecycle ISPM capabilities can help organisations do more—and more effectively—with less.”

Cyber Technology Insights : Theori and Okta Enter Agreement to Enhance Security Posture and Resilience

“RSA Governance & Lifecycle provides organizations with the tools, visibility, and insights they need to mature their cybersecurity posture, proactively resolve risks, and fulfill audit requirements,” said Alaa Abdulnabi, RSA SVP and General Manager, International. “These innovations ensure that high-security organizations can stay ahead of cybersecurity threats and operational challenges.”

The new RSA Governance & Lifecycle ISPM capabilities announced at Infosec Europe 2025 offer key benefits for enterprises, including:

Unparalleled visibility: Advanced dashboards offer a comprehensive view of identity risk across your entire environment, enabling organisations to take proactive measures to secure resources, reduce their attack surface, and prevent breaches before they happen.

Actionable insights for everyone: Dashboards visualize complex data for admins, business leaders, and executives to coordinate and prioritize action.

Easier, continuous compliance:New RSA Governance & Lifecycle ISPM capabilities make it easy to surface the evidence auditors need, highlight areas that require attention, and reveal opportunities to reduce risk—all while aiding with GDPR, SOX, ISO 27001, SOC 2, and other compliance initiatives.

RSA Announces New Windows Desktop Login and Entra ID Passwordless Solutions

RSA also announced additional passwordless features to RSA® ID Plus, the complete identity security platform, that help organisations accelerate deployment of phishing-resistant passwordless solutions across their entire environment, reducing risks, modernizing authentication, and driving efficiency:

Passwordless support for Windows Desktop Login and Entra ID: ID Plus now supports mobile passkeys and QR codes to complete Windows log-in. ID Plus will add Entra ID support in July.

One-step enrollment process: Starting in July, users will be able to enroll new RSA mobile passkeys and other RSA MFA methods via a one-step enrollment process that eliminates delays and reduces help desk support.

Code matching for RADIUS: Organizations operating in RADIUS environments can now deploy code matching to reduce the risk of prompt bombing and ensure legacy architecture stays operational.

These new passwordless enhancements are fortified by deep security innovations that protect organisations against post-passwordless threats. The newly-announced RSA Help Desk Live Verify (patent pending), only available through ID Plus, uses passwordless bi-directional identity verification to stop help desk scams like the recent attack on Marks & Spencer, Christian Dior, Co-Op, and MGM Resorts. RSA Mobile Lock secures the authentication process itself by scanning devices for app tampering, malware, sideloading, jailbreaking, and AiTM attacks.

Cyber Technology Insights : ConnectSecure Launches Google Workspace Assessments to Strengthen Cloud Security Posture for MSPs

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleViLE Gang Sentenced for DEA Portal Breach and Extortion
Next Article Backdoored Malware Repositories: A Trap for Novice Cybercriminals
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Adeel Shaikh Releases Updated Book on AI-Driven SOC Shif

June 14, 2025

Glider AI Launches ID Verify to Tackle Hiring Fraud Risks

June 14, 2025

SutiSign Boosts eSignature Security with Smart ID Verificatio

June 14, 2025
Leave A Reply Cancel Reply

Latest Posts

Cyber Threats Shift: Hackers Target U.S. Insurance Firms

June 16, 20250 Views

Kali Linux 2025.2: Unleashing 13 New Tools and Car Hacking Enhancements!

June 16, 20250 Views

240,000 Affected in Ocuco Data Breach Crisis

June 16, 20250 Views

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Retail Threat Group Shifts Focus to Insurance Industry

June 16, 2025

Exposed Developer Secrets Are a Big Problem. AI is Making Them Exponentially Worse

June 16, 2025

Cyber Threats Shift: Hackers Target U.S. Insurance Firms

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.