5 Hot Takes from AWS re:Inforce 2022
The city of Boston was hot this July – and we’re not just talking about record-breaking temperatures. The cybersecurity community showed up and turned up the heat, exploring Identity...
Read Article
Securing Cloud Environments by Lifting the Veil on Excessive Permissions
Have you ever written an email to your boss only to find multiple typos after you’ve sent it, or missed an important work deadline, or hastily clicked on a phishing email? It happens. There’s a...
Read Article
Why Tackling Serverless IAM Threats Takes a Team
Cloud-native serverless architecture — sometimes known as function as a service, or FaaS — promises to take application development to new heights. Without the burden of managing infrastructure...
Read Article
Cloud Entitlements Manager – Detection of Entitlements for Federated Identities in AWS
Cloud Entitlements Manager now provides visibility into permissions usage for employee identities accessing AWS roles via federation.
Read Article
Data Breach Costs and Cloud Security Implications: 2021
A hybrid cloud makes a lot of sense for most modern businesses. By stacking all your IT “building blocks” — services and infrastructure hosted on-premises or in your private and public cloud...
Read Article
Stopping Cyber Threats with Unstoppable Innovation
Several powerful and unforeseen market forces are driving the need for new, innovative approaches to combat evolving cyber threats. Central to achieving this critical mission is securing...
Read Article
Reduce Cloud Compliance Risk with Least Privilege
Meeting regulatory compliance requirements is one of global organizations’ top challenges as they scale cloud deployments and embrace multi-cloud strategies to drive business efficiencies. The...
Read Article