{"id":14550,"date":"2025-08-01T13:09:22","date_gmt":"2025-08-01T13:09:22","guid":{"rendered":"https:\/\/newestek.com\/?p=14550"},"modified":"2025-08-01T13:09:22","modified_gmt":"2025-08-01T13:09:22","slug":"identity-management-and-information-security-news-for-the-week-of-august-1st-palo-alto-networks-cyberhaven-securonix-and-more","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14550","title":{"rendered":"Identity Management and Information Security News for the Week of August 1st: Palo Alto Networks, Cyberhaven, Securonix, and More"},"content":{"rendered":"<div>\n<p><a href=\"https:\/\/newestek.com\/wp-content\/uploads\/2025\/08\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st.jpg\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium_large wp-image-7478\"src=\"https:\/\/newestek.com\/wp-content\/uploads\/2025\/08\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st.jpg\" alt=\"Identity Management and Information Security News for the Week of August 1st\" width=\"768\" height=\"432\" srcset=\"https:\/\/solutionsreview.com\/identity-management\/files\/2025\/07\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st-768x432.jpg 768w, https:\/\/solutionsreview.com\/identity-management\/files\/2025\/07\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st-300x169.jpg 300w, https:\/\/solutionsreview.com\/identity-management\/files\/2025\/07\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st-1024x576.jpg 1024w, https:\/\/newestek.com\/wp-content\/uploads\/2025\/08\/Identity-Management-and-Information-Security-News-for-the-Week-of-August-1st.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\"><\/a><\/p>\n<p style=\"text-align: justify;\"><em><strong>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of August 1st. This round-up covers announcements and updates from Palo Alto Networks, Cyberhaven, Securonix, and more.<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\">Keeping tabs on all the most relevant\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity Management<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/\" target=\"_blank\" rel=\"noopener\">Information Security<\/a><\/strong> news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from the week of August 1st.<\/p>\n<p style=\"text-align: justify;\">\n<div class=\"box box3\">For early access to all the expert insights published on Solutions Review, <strong><em><a class=\"article-editor-content__link article-editor-content__link\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noopener noreferrer\">join Insight Jam<\/a><\/em><\/strong>, a community dedicated to enabling the human conversation on AI.<\/div>\n<h2 style=\"text-align: center;\"><strong>Identity Management and Information Security News for the Week of August 1st<\/strong><\/h2>\n<hr>\n<h3><a href=\"https:\/\/www.globenewswire.com\/news-release\/2025\/07\/31\/3124922\/0\/en\/authID-Launches-Identity-Exchange-IDX-to-Eliminate-Enterprise-Identity-Blind-Spots-in-Strategic-Partnership-with-NEC-Networks-System-Integration-Corporation-NESIC.html\" target=\"_blank\" rel=\"noopener\"><strong>authID Releases the authID Identity Exchange (IDX) Platform<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">authID, a provider of biometric identity verification and authentication solutions, has launched authID Identity Exchange (IDX), a new platform purpose-built to close long-standing gaps in enterprise identity and access management. The IDX platform aims to modernize identity management with biometric-bound, passwordless, interoperable credentials that stop phishing attacks, ensuring only verified users can access sensitive systems and data. IDX was developed in partnership with NESIC, an\u00a0integrated IT and network solution provider for digital transformation.<\/p>\n<p><a href=\"https:\/\/www.globenewswire.com\/news-release\/2025\/07\/31\/3124922\/0\/en\/authID-Launches-Identity-Exchange-IDX-to-Eliminate-Enterprise-Identity-Blind-Spots-in-Strategic-Partnership-with-NEC-Networks-System-Integration-Corporation-NESIC.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/cloudbrink.com\/press-releases\/cloudbrink-adds-native-identity-management-and-crowdstrike-integration-to-its-sase-creating-a-unified-platform-with-higher-security-and-less-complexity\/\" target=\"_blank\" rel=\"noopener\"><strong>Cloudbrink Expands Its Personal SASE Platform With Identity Management Capabilities<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Cloudbrink, a high-performance secure connectivity provider, has expanded its Personal SASE platform to provide native identity management capabilities and direct integration with CrowdStrike. The unified system uses a zero-trust approach to help organizations streamline user and device authentication from a single console, reducing operational complexity, minimizing errors, and lowering costs previously incurred by disparate identity solutions. These features will be especially relevant for enterprises with hybrid workforces and numerous third-party users by enhancing their security and centralized compliance avenues.<\/p>\n<p><a href=\"https:\/\/cloudbrink.com\/press-releases\/cloudbrink-adds-native-identity-management-and-crowdstrike-integration-to-its-sase-creating-a-unified-platform-with-higher-security-and-less-complexity\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.prnewswire.com\/news-releases\/cyberhaven-transforms-enterprise-data-security-with-reimagined-dlp-and-insider-threat-platform-302516166.html\" target=\"_blank\" rel=\"noopener\"><strong>Cyberhaven Debuts New Data Loss Prevention and Threat Protection Features<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Cyberhaven, an AI-powered data security company, has announced new product capabilities to help its customers better secure their data in motion and at rest. The updates include \u201creimagined\u201d data loss prevention (DLP) and insider threat protection features, which Cyberhaven will use to create an operationally efficient data protection system that understands data context without relying on isolated content scanning. At the center of these updates are four new capabilities: a data catalog, AI-powered data classification tools, endpoint data-at-rest scanning, and cloud connectors that provide deeper visibility into data interactions across OneDrive, SharePoint, and Google Drive.<\/p>\n<p><a href=\"https:\/\/www.prnewswire.com\/news-releases\/cyberhaven-transforms-enterprise-data-security-with-reimagined-dlp-and-insider-threat-platform-302516166.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3 class=\"my-0\"><a href=\"https:\/\/www.entrust.com\/company\/newsroom\/entrust-bolsters-executive-team-with-key-leadership-promotions\" target=\"_blank\" rel=\"noopener\"><strong>Entrust Grows Its Leadership Team With Strategic Promotions<\/strong><\/a><\/h3>\n<p class=\"my-0\" style=\"text-align: justify;\">Entrust, an identity-centric security solution provider, has made several strategic appointments to strengthen its leadership team. These include the promotions of Mike Baxter to President and Chief Technology and Product Officer, Patrick Steele to Chief Sales Officer, and Kelsey Holthus to Chief Human Resources Officer. Todd Wilkinson, CEO of Entrust, says, \u201cThese appointments reflect the strength of our leadership bench and our focus on building a future-ready organization. Mike, Patrick, and Kelsey each bring a unique blend of experience, innovation, and people-first leadership that will help Entrust continue to thrive.\u201d<\/p>\n<p><a href=\"https:\/\/www.entrust.com\/company\/newsroom\/entrust-bolsters-executive-team-with-key-leadership-promotions\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250728415715\/en\/Fable-Security-Launches-With-%2431M-to-Stop-Risky-Human-Behavior\" target=\"_blank\" rel=\"noopener\"><strong>Fable Security Launches Its Human Risk Management Platform<\/strong><\/a><\/h3>\n<p class=\"my-0\" style=\"text-align: justify;\">Fable Security, a modern human risk management platform, has announced its launch with $31 million in funding from Greylock Partners and Redpoint Ventures. The Fable platform is designed to help companies understand how risk emerges from behavior, deploy interventions in real-time, and measurably change behaviors. At the platform\u2019s core is the Human Behavior Index, a proprietary framework that Fable uses to identify employee behaviors that introduce risk by synthesizing thousands of real-time signals from identity, access, cloud, endpoint, and productivity systems.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250728415715\/en\/Fable-Security-Launches-With-%2431M-to-Stop-Risky-Human-Behavior\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250730514756\/en\/Keyfactor-Finds-Nearly-Half-of-Enterprises-Unprepared-for-Quantum-Cybersecurity-Threats\" target=\"_blank\" rel=\"noopener\"><strong>Keyfactor Shares Findings From a Report on the State of Post-Quantum Cryptography<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Keyfactor, a digital trust provider for modern enterprises, has announced findings from its <em>Digital Trust Digest: The Quantum Readiness Edition<\/em>, conducted in partnership with Wakefield Research. The report reveals the state of post-quantum cryptography (PQC) from the perspective of cybersecurity professionals, finding nearly half of companies (48 percent) are not prepared to confront the urgent challenges posed by quantum computing. Jordan Rackie, CEO of Keyfactor, says, \u201cOur research shows that while awareness is growing, action is lagging. Organizations that treat PQC as a strategic priority today will be the ones who lead tomorrow\u2014in security, resilience, and digital trust.\u201d<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250730514756\/en\/Keyfactor-Finds-Nearly-Half-of-Enterprises-Unprepared-for-Quantum-Cybersecurity-Threats\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729764616\/en\/KnowBe4-Collaborates-With-Microsoft-To-Tackle-Risky-Online-Behaviors\" target=\"_blank\" rel=\"noopener\"><strong>KnowBe4 and Microsoft Announce a New Integration<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">KnowBe4, a cybersecurity platform focused on human risk management, has announced a collaboration with Microsoft to integrate KnowBe4 SecurityCoach with the Microsoft Edge for Business browser. By leveraging native browser telemetry to convert incidents of password reuse, blocked site visits, and other dangerous activities into teachable moments, the integration will provide companies with real-time security recommendations whenever risky user behavior is detected within the browser. This will also combine technical controls with behavioral change for organizations committed to reducing human cyber risk across the Microsoft ecosystem.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729764616\/en\/KnowBe4-Collaborates-With-Microsoft-To-Tackle-Risky-Online-Behaviors\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.prnewswire.com\/news-releases\/pangea-unveils-industry-leading-ai-detection--response-platform-302515685.html\" target=\"_blank\" rel=\"noopener\"><strong>Pangea Launches Its AI Detection and Response Solution<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Pangea, an AI security guardrail provider, has shared details on the Pangea AI Detection and Response (AIDR), a security platform designed to monitor, detect, and secure GenAI across the enterprise. The platform uses AI sensors across form factors to feed telemetry into a powerful AI policy control and threat detection engine, with alerts and logs viewable via an analyst console. For example, those sensors provide visibility and control for browsers, agentic frameworks, cloud environments, AI gateways, coding tools, and more. To coincide with its platform launch, Pangea also launched an expansion for Pangea Labs, new red teaming services for AI systems, and additional protections for emerging threats.<\/p>\n<p><a href=\"https:\/\/www.prnewswire.com\/news-releases\/pangea-unveils-industry-leading-ai-detection--response-platform-302515685.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2025\/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leader?utm_medium=social\" target=\"_blank\" rel=\"noopener\"><strong>Palo Alto Networks to Acquire CyberArk<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Palo Alto Networks, a global cybersecurity company, has announced that it is acquiring CyberArk, an identity security provider for organizations worldwide. The acquisition will combine CyberArk\u2019s experience in identity security and Privileged Access Management (PAM) with Palo Alto Networks\u2019 AI-powered security platforms, extending privileged identity protection to all identity types, including human, machine, and the new wave of autonomous AI agents. Additionally, combining the two companies will lead to a comprehensive and integrated security portfolio that provides customers with a single, trusted vendor capable of meeting their most critical security needs.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2025\/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leader?utm_medium=social\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729124408\/en\/Securonix-and-Banyax-Join-Forces-to-Deliver-Advanced-Insider-Threat-Detection-with-Behavior-Analytics-Powered-by-AI\" target=\"_blank\" rel=\"noopener\"><strong>Securonix Details Its Partnership with Banyax<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Securonix, an SIEM company, has announced a customer partnership with Banyax, a Managed Extended Detection and Response (MXDR) provider. As part of the partnership, Banyax will leverage Securonix\u2019s User and Entity Behavior Analytics (UEBA) platform to analyze extensive telemetry from endpoints, users, and cloud assets, providing precise internal risk detection and streamlined responses. Kash Shaikh, CEO of Securonix, says, \u201cOur work with Banyax is a model of what strong partnerships should look like, built on technical trust, shared innovation, and a relentless focus on customer outcomes.\u201d<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729124408\/en\/Securonix-and-Banyax-Join-Forces-to-Deliver-Advanced-Insider-Threat-Detection-with-Behavior-Analytics-Powered-by-AI\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729421548\/en\/SpecterOps-Expands-the-Power-of-Attack-Path-Management-to-Reduce-Identity-Risk-Across-the-Enterprise-with-BloodHound-OpenGraph-and-v8.0?feedref=JjAwJuNHiystnCoBq_hl-V2wqxRmnpgZtOypyHtjMYiqcp-o_pnudlUwsb5apQ1S4gUE65BTfjH3-pSuqdv0gW3cb3F4oTIgUqCPafFkgu4s9L7CzgBlYMXxVoyWhzlQ\" target=\"_blank\" rel=\"noopener\"><strong>SpecterOps Reveals BloodHound v8.0<\/strong><\/a><\/h3>\n<p>SpecterOps, an identity risk management and adversary tradecraft company, has announced BloodHound v8.0, the latest version of its open-source Attack Path Management security platform. The update expands SpecterOps\u2019 ability to identify and remediate identity risks across complex enterprise environments. Specific additions include coverage for Microsoft PIM roles in BloodHound Enterprise, a ServiceNow integration, Privilege Zone analysis tools, inheritance tracking, Kali Linux support, two-factor authentication, and flexible security policies for team members.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250729421548\/en\/SpecterOps-Expands-the-Power-of-Attack-Path-Management-to-Reduce-Identity-Risk-Across-the-Enterprise-with-BloodHound-OpenGraph-and-v8.0?feedref=JjAwJuNHiystnCoBq_hl-V2wqxRmnpgZtOypyHtjMYiqcp-o_pnudlUwsb5apQ1S4gUE65BTfjH3-pSuqdv0gW3cb3F4oTIgUqCPafFkgu4s9L7CzgBlYMXxVoyWhzlQ\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h2 style=\"text-align: center;\"><strong>Expert Insights Section<\/strong><\/h2>\n<hr>\n<p style=\"text-align: justify;\">Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from <i>Insight Jam<\/i>, Solutions Review\u2019s <a class=\"fui-Link ___10kug0w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn external\" title=\"https:\/\/insightjam.com\/share\/8qpqn88mnqikpnxu?utm_source=manual\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\"Link enterprise tech community for business software pros\"><strong><u>enterprise tech community for business software pros<\/u><\/strong><\/a>. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends, predictions, and vendor-neutral software evaluation tools.<\/p>\n<hr>\n<h3 style=\"text-align: justify;\"><a href=\"https:\/\/www.youtube.com\/watch?v=ExqUkUHL-W0\" target=\"_blank\" rel=\"noopener\"><strong>How AI Augments Security Decision Making \u2013 The Cyber Circuit<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">In the inaugural episode of The Cyber Circuit, cybersecurity veteran Michael Morgenstern sits down with Blackwire Labs CEO Josh Ray to explore how AI-augmented decision support is revolutionizing enterprise security. They cover everything from stopping breaches in four hours to transforming three-month exercises into one-hour sessions. Other topics include why CISOs treat AI as their newest team member, not their replacement, and how top enterprises are closing the gap between the 80 percent who say trustworthy AI is essential and the 25 percent who have governance in place.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=ExqUkUHL-W0\" target=\"_blank\" rel=\"noopener\"><strong>Watch Here.<\/strong><\/a><\/p>\n<hr>\n<p style=\"text-align: center;\"><em>For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.<\/em><\/p>\n<p>The post <a href=\"https:\/\/solutionsreview.com\/identity-management\/identity-management-and-information-security-news-for-the-week-of-august-1st\/\">Identity Management and Information Security News for the Week of August 1st: Palo Alto Networks, Cyberhaven, Securonix, and More<\/a> appeared first on <a href=\"https:\/\/solutionsreview.com\/identity-management\">Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, &amp; Services<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of August 1st. This round-up covers announcements and updates from Palo Alto Networks, Cyberhaven, Securonix, and more. Keeping tabs on all the most relevant\u00a0Identity Management\u00a0and\u00a0Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14550\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":14551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14550"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14550\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/media\/14551"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}