The Ultimate Guide to Privileged Access Management
A curated Kiwi edition of TechDay news, analysis, interviews, reviews, job moves, and related resources for Privileged Access Management (PAM).
What to know about Privileged Access Management
Privileged Access Management (PAM) is a critical component of cybersecurity focused on securing, controlling, and monitoring privileged accounts and access within an organisation. Privileged access refers to elevated permissions that allow users to perform sensitive operations in IT systems, networks, cloud environments, and applications. Managing these privileges effectively helps prevent insider threats, credential theft, and external cyberattacks that can lead to severe data breaches or operational disruptions.
The stories tagged with Privileged Access Management highlight industry developments such as new product features, security enhancements, integrations with cloud services, AI-powered automation, and partnerships aiming to strengthen PAM strategies. They emphasize challenges organisations face in maintaining visibility and control over privileged accounts, especially as hybrid cloud architectures, DevOps workflows, and remote work increase the complexity of access management.
Reading about Privileged Access Management on our blog provides insights into best practices for implementing least privilege principles, just-in-time access, multi-factor authentication, and zero trust security models. The content also underscores regulatory compliance considerations and the evolving threat landscape, including ransomware and insider misuse. By exploring these stories, readers can learn how PAM solutions adapt to emerging technologies and cyber risks to safeguard critical infrastructure and sensitive information effectively.
Kiwi Privileged Access Management News
Regional stories with direct local relevance
The hidden risk in New Zealand's digital transformation
Wider use of cloud, remote access and suppliers is leaving New Zealand organisations with harder-to-track cyber risk and weaker control.
Trust Panda opens Auckland YubiKey hub for New Zealand
New Zealand buyers can now get phishing-resistant security keys faster, after a local Auckland stockholding cut import delays for agencies and firms.
Keeper Security and Soft Solutions bring specialised cybersecurity to NZ
This collaboration establishes Soft Solutions as an authorised distributor of Keeper's cybersecurity solutions in the New Zealand market.
The GDPR and NZ: Why this relationship is so important to the future of data privacy in Aotearoa
In 2018, a new unprecedented data privacy law took the EU and, by association, the rest of the world by storm.
Advantage first NZ MSSP to achieve LogRhythm Security Services Authorisation
Advantage becomes first company in New Zealand and second in Australia to achieve Security Services Authorisation from cybersecurity firm LogRhythm.
Chillsoft to distribute CyberArk security solutions in NZ & Pacific Islands
New Zealand IT security distributor Chillisoft has partnered with CyberArk to bring cybersecurity solutions to the region.
Analyst Insights
Research and market analysis connected to Privileged Access Management
Capsule Security raises $7 million to guard AI agents
Keeper unveils KeeperDB to tighten database access
Commvault urges identity-first cyber resilience in AI age
Cayosoft posts 76% ARR surge on identity recovery boom
Okta unveils tools to detect & govern shadow AI risks
Featured News
How Formula 1 turns data & cyber security into speed
At Albert Park, F1 insiders reveal how sharper data use, tighter security and resilience planning combine to unlock race-winning performance.
Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Expert Columns
Why service desks are emerging as a critical security weakness
Why runtime identity is emerging as the next cybersecurity imperative
The hidden risk in New Zealand's digital transformation
Why organisations need a version of 'HR' for AI agents
2026: Resilience, the new foundation of cybersecurity
Watch out for these eight trends to impact cybersecurity teams in 2026
2026 Predictions: The year identity becomes the ultimate control point for an autonomous world
Meet credential auditor: Take control of credential sprawl with automated discovery and dontrol
When trusted tools go rogue: The return of the 'Confused Deputy Problem'
Interviews
Interviews and video coverage from the networkRecent Privileged Access Management News
APAC firms struggle as AI identities swell, survey finds
Pressure is mounting on security teams as non-human identities and AI tools outpace controls, leaving APAC firms exposed to misuse.
OpenAI launches GPT-5.5-Cyber for vetted defenders
Vetted security teams will get fewer refusals on authorised tasks as OpenAI tightens access around its most permissive cyber model.
Genetec urges tighter identity controls for security systems
AI-driven attacks are exposing weak passwords on cameras and access controls, prompting calls for stricter governance across physical security systems.
Recast adds Intune tools for hybrid endpoint teams
IT teams can now handle more hybrid endpoint tasks in one place as Recast widens Right Click Tools support for Intune and Entra ID.
Okta warns Australian firms on AI agent security gap
Australian organisations are racing ahead with AI agents, but most still lack the identity controls needed to secure non-human users at scale.
Keeper Security launches Agent Kit for AI coding agents
It lets developers use AI coding tools without pasting sensitive credentials into prompts, reducing the risk of secrets leaking into logs or source control.
ANZ firms shift to cyber resilience as AI risk grows
Rising AI use is widening attack surfaces, while most organisations still need nearly a month to recover from cyber incidents.
Qualys warns cloud risk now stems from identity design
Poor identity controls and slow remediation are leaving cloud users exposed as attacks now exploit trust relationships rather than one flaw.
Keeper launches Verify Mode to block phishing logins
Enterprise administrators can now warn staff before passwords are pasted into fake sites, as phishing remains a major cause of breaches.
HAT signs exclusive Tailscale distribution deal in Oceania
Businesses across Oceania will gain a local route to Tailscale as HAT backs demand for simpler secure access across cloud and hybrid estates.
The Gentlemen becomes second most active ransomware group
Check Point Research says a better affiliate payout is helping the gang spread fast, with more than 320 claimed victims since mid-2025.
Critical Microsoft vulnerabilities double in yearly report
Critical Microsoft flaws surged as Azure, Dynamics 365 and Office saw big jumps, even though total vulnerabilities fell 6% in 2025.
Sysdig report says cloud security shifts to machine speed
Shorter attack windows are pushing cloud teams towards automated defence, as Sysdig says AI-driven threats now outpace manual response.
Keeper boosts endpoint privilege governance for firms
Large firms can now curb standing admin rights more tightly, as Keeper adds approvals, expiry checks and audit trails across endpoints.
Secureframe launches access review tool for compliance teams
Manual access checks are being folded into one audit trail as compliance teams face heavier evidence-gathering workloads and tighter oversight.
Attackers exploit trust in Blackpoint Cyber report
Credential theft and trusted tools are helping intruders bypass traditional defences, with manufacturing firms among the hardest hit.
Exabeam expands AI agent analytics to ChatGPT, Copilot
Security teams now get visibility into employee and AI agent activity in ChatGPT and Copilot, helping spot misuse across enterprise systems.
Bitdefender launches free attack surface assessment
A rise in Living-Off-the-Land attacks is leaving organisations exposed to hidden internal risks, Bitdefender said as it opened the service to larger firms.
RSA expands Microsoft tie-up with passwordless access
Organisations can now extend passwordless logins to desktops, servers and AI agents, tightening identity checks across hybrid systems.