Rezonate was recognized as a 2023 Gartner® Cool Vendor™ in Identity-First Security. Learn More.

ITDR

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Get everything you need to know about using EntraID Conditional Access policies to boost your identity security posture.
Read More

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of ...

Read More

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of ...

Read More
Midnight Blizzard's Microsoft Hack: How ITDR Could Have Helped Microsoft

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity ...

Read More
How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

On October 19, 2023, Okta notified its customers of a security breach involving unauthorized access to their support system. This incident occurred when an external party obtained and misused ...

Read More

MITRE-like Framework for Identity Security

A pivotal shift from perimeter-based security measures is being witnessed in the rapidly shifting landscape of cybersecurity. Identity management is becoming more complex with the move to the ...

Read More
What is ITDR (Identity Threat Detection & Response) and Things to Look Out For

What is ITDR (Identity Threat Detection & Response) and Things to Look Out For

In the brick-and-mortar world, our physical presence assumes our identity. But the virtual world disrupts this age-old presumption. From pseudonyms to shadow identities and avatars to digital ...

Read More
CIEM vs. ITDR

CIEM vs. ITDR

If your organization hasn’t already adopted the Cloud, you’ll be met with one question: “Why?” The shift towards Cloud computing brings unprecedented advantages, ...

Read More
Threat Hunting for Identity Threats in Snowflake

Frosty Trails: Threat-Hunting for Identity Threats in Snowflake

The Snowflake platform has revolutionized how organizations store, process, and analyze large volumes of data. It offers a fully-managed data warehouse-as-a-service solution, providing a ...

Read More