Deconstructing Identity Security
Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration...
How to Secure Secrets in Multi-cloud Environments
It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining...
Meet PCI DSS Compliance and Protect Cardholder Data with PAM Controls
The 2022 holiday online shopping season is shaping up to be a busy one. An estimated 63.9 million people will shop this Cyber Monday, while global eCommerce transactions are expected to climb 15%...
5 Hot Takes from AWS re:Inforce 2022
The city of Boston was hot this July – and we’re not just talking about record-breaking temperatures. The cybersecurity community showed up and turned up the heat, exploring Identity...
Securing Cloud Environments by Lifting the Veil on Excessive Permissions
Have you ever written an email to your boss only to find multiple typos after you’ve sent it, or missed an important work deadline, or hastily clicked on a phishing email? It happens. There’s a...
Why Tackling Serverless IAM Threats Takes a Team
Cloud-native serverless architecture — sometimes known as function as a service, or FaaS — promises to take application development to new heights. Without the burden of managing infrastructure...
Cloud Entitlements Manager – Detection of Entitlements for Federated Identities in AWS
Cloud Entitlements Manager now provides visibility into permissions usage for employee identities accessing AWS roles via federation.
Data Breach Costs and Cloud Security Implications: 2021
A hybrid cloud makes a lot of sense for most modern businesses. By stacking all your IT “building blocks” — services and infrastructure hosted on-premises or in your private and public cloud...