The Ultimate Guide to Privileged Access Management
A curated Kiwi edition of TechDay news, analysis, interviews, reviews, job moves, and related resources for Privileged Access Management (PAM).
What to know about Privileged Access Management
Privileged Access Management (PAM) is a critical component of cybersecurity focused on securing, controlling, and monitoring privileged accounts and access within an organisation. Privileged access refers to elevated permissions that allow users to perform sensitive operations in IT systems, networks, cloud environments, and applications. Managing these privileges effectively helps prevent insider threats, credential theft, and external cyberattacks that can lead to severe data breaches or operational disruptions.
The stories tagged with Privileged Access Management highlight industry developments such as new product features, security enhancements, integrations with cloud services, AI-powered automation, and partnerships aiming to strengthen PAM strategies. They emphasize challenges organisations face in maintaining visibility and control over privileged accounts, especially as hybrid cloud architectures, DevOps workflows, and remote work increase the complexity of access management.
Reading about Privileged Access Management on our blog provides insights into best practices for implementing least privilege principles, just-in-time access, multi-factor authentication, and zero trust security models. The content also underscores regulatory compliance considerations and the evolving threat landscape, including ransomware and insider misuse. By exploring these stories, readers can learn how PAM solutions adapt to emerging technologies and cyber risks to safeguard critical infrastructure and sensitive information effectively.
Kiwi Privileged Access Management News
Regional stories with direct local relevance
The hidden risk in New Zealand's digital transformation
New Zealand organisations are urged to tighten controls on third-party access and identity management as digitisation and AI reshape risk.
Trust Panda opens Auckland YubiKey hub for New Zealand
Trust Panda opens Auckland hub with local YubiKey stock for New Zealand buyers as phishing fears drive demand for stronger authentication.
Keeper Security and Soft Solutions bring specialised cybersecurity to NZ
This collaboration establishes Soft Solutions as an authorised distributor of Keeper's cybersecurity solutions in the New Zealand market.
The GDPR and NZ: Why this relationship is so important to the future of data privacy in Aotearoa
In 2018, a new unprecedented data privacy law took the EU and, by association, the rest of the world by storm.
Advantage first NZ MSSP to achieve LogRhythm Security Services Authorisation
Advantage becomes first company in New Zealand and second in Australia to achieve Security Services Authorisation from cybersecurity firm LogRhythm.
Chillsoft to distribute CyberArk security solutions in NZ & Pacific Islands
New Zealand IT security distributor Chillisoft has partnered with CyberArk to bring cybersecurity solutions to the region.
Analyst Insights
Research and market analysis connected to Privileged Access Management
Capsule Security raises $7 million to guard AI agents
Keeper unveils KeeperDB to tighten database access
Commvault urges identity-first cyber resilience in AI age
Cayosoft posts 76% ARR surge on identity recovery boom
Okta unveils tools to detect & govern shadow AI risks
Featured News
How Formula 1 turns data & cyber security into speed
At Albert Park, F1 insiders reveal how sharper data use, tighter security and resilience planning combine to unlock race-winning performance.
Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Expert Columns
Why service desks are emerging as a critical security weakness
Why runtime identity is emerging as the next cybersecurity imperative
The hidden risk in New Zealand's digital transformation
Why organisations need a version of 'HR' for AI agents
2026: Resilience, the new foundation of cybersecurity
Watch out for these eight trends to impact cybersecurity teams in 2026
2026 Predictions: The year identity becomes the ultimate control point for an autonomous world
Meet credential auditor: Take control of credential sprawl with automated discovery and dontrol
When trusted tools go rogue: The return of the 'Confused Deputy Problem'
Interviews
Interviews and video coverage from the networkRecent Privileged Access Management News
APAC firms struggle as AI identities swell, survey finds
Asia-Pacific firms face mounting identity security strain as AI agents and machine accounts swell, with 94% of IT leaders reporting difficulties.
Genetec urges tighter identity controls for security systems
Genetec warns AI-driven attacks are exposing weak passwords and access gaps in connected cameras, doors and cloud-based security systems.
Recast adds Intune tools for hybrid endpoint teams
Recast expands Right Click Tools with Intune, Autopilot and patching updates to help hybrid Microsoft endpoint teams manage devices from one place.
Okta warns Australian firms on AI agent security gap
Okta says Australian organisations are racing ahead with AI agents, but only 10% have identity systems ready to secure them and 41% lack clear ownership.
Keeper Security launches Agent Kit for AI coding agents
Keeper Security launches Agent Kit to let AI coding assistants handle secrets and admin tasks without exposing credentials in chat logs.
ANZ firms shift to cyber resilience as AI risk grows
ANZ organisations shift towards cyber resilience as AI adoption surges, with most expecting greater spend despite gaps in risk checks and recovery.
Qualys warns cloud risk now stems from identity design
Qualys report says cloud breaches are increasingly driven by identity design, delegated trust and slow remediation as AI widens exposure.
Keeper launches Verify Mode to block phishing logins
Keeper Security launches Verify Mode for enterprise browser extension, warning users before passwords are entered on suspicious sites to curb phishing logins.
HAT signs exclusive Tailscale distribution deal in Oceania
HAT Distribution lands exclusive Tailscale partnership to help Oceania partners replace legacy VPNs with secure identity-based connectivity.
The Gentlemen becomes second most active ransomware group
The Gentlemen ransomware group has surged to second place in 2026 by victim count, with Check Point saying it may be far larger than its public tally.
Critical Microsoft vulnerabilities double in yearly report
Critical Microsoft flaws double as Azure and Dynamics 365 risks surge, BeyondTrust warns organisations to prioritise identity and privilege controls.
Sysdig report says cloud security shifts to machine speed
Sysdig says companies are increasingly leaning on automated defence as AI-driven attacks accelerate, with machine identities now dominating cloud access.
Keeper boosts endpoint privilege governance for firms
Keeper Security adds approval workflows and audit logging to Endpoint Privilege Manager as enterprises tighten control over temporary admin access.
Secureframe launches access review tool for compliance teams
Secureframe adds user access reviews to Comply platform to help compliance teams replace spreadsheets and email with a single audit-ready workflow.
Attackers exploit trust in Blackpoint Cyber report
Blackpoint Cyber warns attackers are increasingly slipping in through trusted credentials, VPNs and remote tools, with fake CAPTCHA scams leading incidents.
Exabeam expands AI agent analytics to ChatGPT, Copilot
Exabeam widens AI agent monitoring to ChatGPT and Copilot, as chief AI and product officer Steve Wilson says digital workers need closer oversight.
Bitdefender launches free attack surface assessment
Bitdefender offers free 45-day internal security check to spot over-entitled staff access as attackers increasingly abuse trusted tools.
RSA expands Microsoft tie-up with passwordless access
RSA deepens its Microsoft 365 E7 alliance to secure human and AI identities, rolling out wider passwordless access across complex estates.
AI agents blur human access lines in enterprise systems
Most organisations cannot distinguish AI agents from human staff, exposing widening identity and access risks as autonomous tools spread.