{"id":14904,"date":"2025-10-03T13:06:27","date_gmt":"2025-10-03T13:06:27","guid":{"rendered":"https:\/\/newestek.com\/?p=14904"},"modified":"2025-10-03T13:06:27","modified_gmt":"2025-10-03T13:06:27","slug":"identity-management-and-information-security-news-for-the-week-of-october-3rd-sailpoint-corsha-socure-and-more","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14904","title":{"rendered":"Identity Management and Information Security News for the Week of October 3rd: SailPoint, Corsha, Socure, and More"},"content":{"rendered":"<div>\n<p><a href=\"https:\/\/newestek.com\/wp-content\/uploads\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd.jpg\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium_large wp-image-7503\"src=\"https:\/\/newestek.com\/wp-content\/uploads\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd.jpg\" alt=\"Identity Management and Information Security News for the Week of October 3rd\" width=\"768\" height=\"432\" srcset=\"https:\/\/solutionsreview.com\/identity-management\/files\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd-768x432.jpg 768w, https:\/\/solutionsreview.com\/identity-management\/files\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd-300x169.jpg 300w, https:\/\/solutionsreview.com\/identity-management\/files\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd-1024x576.jpg 1024w, https:\/\/newestek.com\/wp-content\/uploads\/2025\/10\/Identity-Management-and-Information-Security-News-for-the-Week-of-October-3rd.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\"><\/a><\/p>\n<p style=\"text-align: justify;\"><em><strong>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of October 3rd. This round-up covers announcements and updates from SailPoint, Corsha, Socure, and more.<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\">Keeping tabs on all the most relevant\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity Management<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/\" target=\"_blank\" rel=\"noopener\">Information Security<\/a><\/strong> news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from the week of October 3rd.<\/p>\n<p style=\"text-align: justify;\">\n<div class=\"box box3\">For early access to all the expert insights published on Solutions Review, <strong><em><a class=\"article-editor-content__link article-editor-content__link\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noopener noreferrer\">join Insight Jam<\/a><\/em><\/strong>, a community dedicated to enabling the human conversation on AI.<\/div>\n<h2 style=\"text-align: center;\"><strong>Identity Management and Information Security News for the Week of October 3rd<\/strong><\/h2>\n<hr>\n<h3><a href=\"https:\/\/www.prnewswire.com\/news-releases\/corsha-advances-machine-identity-provider-midp-with-dynamic-identity-discovery-and-connection-canvas-302573513.html\" target=\"_blank\" rel=\"noopener\"><strong>Corsha Expands Its Platform\u2019s Automated Machine Identity Security<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Corsha, a Machine Identity Provider (mIDP) purpose-built to secure machine-to-machine (M2M) communication across operational systems, has announced innovations that extend its platform\u2019s automated machine identity security. The additions include Dynamic Machine Identity Discovery, Connection Canvas, and a new integration with Dragos SiteStore. These capabilities will provide security and operational leaders the visibility, context, and automated control they need to manage every machine and connection with accuracy and scale.<\/p>\n<p><a href=\"https:\/\/www.prnewswire.com\/news-releases\/corsha-advances-machine-identity-provider-midp-with-dynamic-identity-discovery-and-connection-canvas-302573513.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.databricks.com\/company\/newsroom\/press-releases\/databricks-announces-data-intelligence-cybersecurity\" target=\"_blank\" rel=\"noopener\"><strong>Databricks Announces Data Intelligence for Cybersecurity<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Databricks, a data and AI company, has launched Data Intelligence for Cybersecurity, a new offering to help organizations defend against modern and AI-driven threats. Data Intelligence for Cybersecurity is designed to seamlessly integrate with existing security stacks, unifying all data and leveraging an open partner ecosystem so security teams can fully harness the power of AI. These functionalities will enable users to identify risks more easily, comprehend\u00a0the full context of an attack, and respond to incidents with greater speed.<\/p>\n<p><a href=\"https:\/\/www.databricks.com\/company\/newsroom\/press-releases\/databricks-announces-data-intelligence-cybersecurity\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.exabeam.com\/press-releases\/exabeam-delivers-first-configurable-peer-benchmarking-for-ciso-decision-making\/\" target=\"_blank\" rel=\"noopener\"><strong>Exabeam Details Its New Security Posture Benchmarking Capability<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Exabeam, a global intelligence and automation provider for security operations, has announced security posture benchmarking for proactive security within Exabeam Nova. With this feature, security leaders can anonymously compare their security posture against similar organizations based on configurable parameters, including industry, region, and company size. Powered by the Exabeam Nova Advisor Agent in Outcomes Navigator, this embedded benchmarking capability analyzes threat detection telemetry and configuration data to assess coverage across MITRE ATT&amp;CK techniques and real-world use cases.<\/p>\n<p><a href=\"https:\/\/www.exabeam.com\/press-releases\/exabeam-delivers-first-configurable-peer-benchmarking-for-ciso-decision-making\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/permiso.io\/blog\/permiso-adds-comprehensive-ai-security-to-its-industry-leading-identity-security-platform\" target=\"_blank\" rel=\"noopener\"><strong>Permiso Security Expands Its Platform With Additional AI Identity Security<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Permiso Security, a real-time identity security provider, has expanded its platform to include additional protections for AI identities, such as AI users, AI builders, and AI agents. The updated solution is designed to treat AI security as an extension of identity security, focusing primarily on runtime intelligence to uncover actual AI usage patterns. \u201cAI isn\u2019t a new silo, it\u2019s an identity problem,\u201d Permiso CTO Ian Ahl says, explaining how the expanded platform can \u201cmap static exposures, and use runtime detection on live activity so you can adopt AI without widening the attack surface.\u201d<\/p>\n<p><a href=\"https:\/\/permiso.io\/blog\/permiso-adds-comprehensive-ai-security-to-its-industry-leading-identity-security-platform\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.sailpoint.com\/press-releases\/sailpoint-adaptive-identity-platform\" target=\"_blank\" rel=\"noopener\"><strong>SailPoint Expands Its Suite with New and Enhanced Capabilities<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">SailPoint, an enterprise identity security company, has announced a wave of new and updated capabilities for its solution suite. Included in these updates is Atlas Enterprise, a collection of tools that enable enterprises to customize governance programs, ingest real-time threat signals, and take immediate action based on risk levels. Additionally, SailPoint has introduced the Model Context Protocol (MCP) Server, which builds on Atlas to bring identity security capabilities to AI-native environments, enabling teams to use AI without compromising trust, compliance, or control.<\/p>\n<p><a href=\"https:\/\/www.sailpoint.com\/press-releases\/sailpoint-adaptive-identity-platform\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.sailpoint.com\/press-releases\/sailpoint-advances-identity-security\" target=\"_blank\" rel=\"noopener\"><strong>SailPoint Introduces New Features to Its Identity Security Cloud Solution<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">SailPoint also announced a series of new enhancements to extend its SailPoint Identity Security Cloud solution, introducing new capabilities for SailPoint Non-Employee Risk Management and Machine Identity Security, alongside a range of deep Connectivity updates. These capabilities also include integration with Microsoft Entra Verified ID, which enables users to leverage third-party verifiable credentials and biometric verification to onboard non-employees faster. Matt Mills, President at SailPoint, says, \u201cWe\u2019re reimagining identity security for the realities of the modern enterprise by unifying governance across every identity type to close the gaps that siloed, legacy approaches leave behind.\u201d<\/p>\n<p><a href=\"https:\/\/www.sailpoint.com\/press-releases\/sailpoint-advances-identity-security\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><strong><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250930097884\/en\/Simbian-Advances-Threat-Hunting-Using-Microsoft-Sentinel-data-lake\" target=\"_blank\" rel=\"noopener\">Simbian Unveils New Capabilities That Use the Microsoft Sentinel Data Lake<\/a><\/strong><\/h3>\n<p style=\"text-align: justify;\">Simbian, a company focused on building \u201cSuperintelligence for Accelerated Security,\u201d has launched an AI Threat Hunt Agent that integrates with the Microsoft Sentinel data lake. The announcement enables Microsoft 365 E5 customers to accelerate and scale their threat hunting capabilities. For example, with the Sentinel data lake, Simbian can reason across months of diverse logs from throughout the enterprise to identify long-running threats or discreetly execute investigations. Simbian also announced that its AI SOC Agent has been enhanced to utilize Microsoft Sentinel\u2019s data lake for investigating and responding to security alerts.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20250930097884\/en\/Simbian-Advances-Threat-Hunting-Using-Microsoft-Sentinel-data-lake\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.socure.com\/news-and-press\/signals-launch\" target=\"_blank\" rel=\"noopener\"><strong>Socure Launches Socure Signals<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Socure\u2014a provider of artificial intelligence for digital identity verification, authentication, KYC, KYB, sanctions screening, and fraud prevention\u2014has launched Socure Signals. This new tool gives enterprises direct access to the feature store powering Socure\u2019s market-leading ML models.\u00a0Socure Signals introduces three categories of exposed intelligence, each capturing a distinct layer of risk. These include input-derived signals (data attributes from PII, documents, biometrics, and behavioral interactions), model-derived signals (probabilistic features from Socure\u2019s proprietary ML models, and graph-derived signals (insights from Socure\u2019s proprietary Identity Graph.<\/p>\n<p><a href=\"https:\/\/www.socure.com\/news-and-press\/signals-launch\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h2 style=\"text-align: center;\"><strong>Expert Insights Section<\/strong><\/h2>\n<hr>\n<p style=\"text-align: justify;\">Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from <i>Insight Jam<\/i>, Solutions Review\u2019s <a class=\"fui-Link ___10kug0w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn external\" title=\"https:\/\/insightjam.com\/share\/8qpqn88mnqikpnxu?utm_source=manual\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\"Link enterprise tech community for business software pros\"><strong><u>enterprise tech community for business software pros<\/u><\/strong><\/a>. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends, predictions, and vendor-neutral software evaluation tools.<\/p>\n<hr>\n<h3><a href=\"https:\/\/solutionsreview.com\/identity-management\/national-insider-threat-awareness-month-quotes-and-commentary-from-industry-experts-in-2025\/\" target=\"_blank\" rel=\"noopener\"><strong>National Insider Threat Awareness Month Quotes and Commentary from Industry Experts in 2025<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">As part of this year\u2019s National Insider Threat Awareness Month, we called for the industry\u2019s best and brightest in Identity and Access Management and the broader cybersecurity market to share best practices, predictions, and personal anecdotes. The experts featured represent some of the top influencers, consultants, and solution providers with experience in these marketplaces, and each quote has been vetted for relevance and ability to add business value.<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/identity-management\/national-insider-threat-awareness-month-quotes-and-commentary-from-industry-experts-in-2025\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.youtube.com\/watch?v=4aE6-SJ2ZrE\" target=\"_blank\" rel=\"noopener\"><strong>Ensuring Ethical AI for Students and Teachers<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">In this excerpt from the Q3 2025 Mini-Jam, a panel of industry experts addresses the pressing challenge of teaching students (and educators) to collaborate with AI as a thinking tool rather than a mere\u00a0answer machine. From the constraints of data protection laws to the two-sigma problem of personalized learning, these experts reveal why probabilistic thinking and authentic assessment strategies are critical to preparing students for an AI-integrated future where every career path will intersect with intelligent systems.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=4aE6-SJ2ZrE\" target=\"_blank\" rel=\"noopener\"><strong>Watch Here.<\/strong><\/a><\/p>\n<hr>\n<p style=\"text-align: center;\"><em>For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.<\/em><\/p>\n<p>The post <a href=\"https:\/\/solutionsreview.com\/identity-management\/identity-management-and-information-security-news-for-the-week-of-october-3rd\/\">Identity Management and Information Security News for the Week of October 3rd: SailPoint, Corsha, Socure, and More<\/a> appeared first on <a href=\"https:\/\/solutionsreview.com\/identity-management\">Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, &amp; Services<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of October 3rd. This round-up covers announcements and updates from SailPoint, Corsha, Socure, and more. Keeping tabs on all the most relevant\u00a0Identity Management\u00a0and\u00a0Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14904\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":14905,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14904"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14904\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/media\/14905"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}