20 January 2026

SIA: On-premises Windows connections to IP-based targets using ZSP

Secure Infrastructure Access (SIA) now allows users to establish RDP connections to on-prem Windows targets by IP address while maintaining Zero Standing Privileges. This is particularly useful for environments where DNS infrastructure or FQDNs aren’t available, removing a common deployment blocker for extending ZSP coverage across legacy or segmented networks.


Read Article



12 January 2026

Enhance Security and Simplify Enrollment with Okta’s Same Device Enrollment

Okta’s Same Device Enrolment streamlines and secures Okta Verify enrolment by allowing users to enrol on their current device using an OIDC flow, eliminating the need for QR codes, SMS, or email, which are vulnerable to interception. This approach enhances security, aligns with authentication policies, and provides a phishing-resistant, more intuitive enrolment experience. Organisations can choose to enforce Same Device Enrollment or offer it as an option alongside mobile-based methods.

Read Article



8 January 2026

The end of legacy IAM: why CrowdStrike and SGNL together changes everything

Why This Matters

  • SGNL’s continuous, context-aware authorization replaces outdated PAM and IGA solutions.
  • Addresses real-time access management challenges, improving security posture.
  • Offers a solution that balances security and usability for enterprises.

What Has Changed

  • CrowdStrike acquires SGNL to deliver identity infrastructure that moves at the speed of threats.
  • The combined platform enables real-time authorization decisions using comprehensive context.
  • It allows enterprises to eliminate standing privileges and automate access decisions.

Timelines

  • Immediate

Read Article



5 January 2026

Saviynt: 2026 Identity Security Trends & Predictions

Why This Matters
• AI adoption has outpaced security frameworks, creating governance gaps.
• Non-human identities (AI agents) now hold elevated privileges without proper oversight.
• Identity security has shifted from a support function to the foundation for AI resilience.

 

What Has Changed
• Emergence of AI agents as primary targets for attacks and insider threats.
• Machine-to-machine connections via MCP introduce new high-risk access paths.
• Data security returns as a frontline challenge due to AI’s ability to surface buried information instantly.

 

Timelines
Released on 05 January 2026

 

Read Article