Cloud Identity and Access Management Alphabet Soup: A Definitive Guide
Successful digital transformation depends on the security of your cloud environment. Modern organizations recognize the importance of securing identities in the zero-perimeter, Zero Trust world of...
Read Article
It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground
Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic...
Read Article
Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk
If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...
Read Article
Revelations About Securing Hybrid Cloud Environments Post-SolarWinds
In the early 1960s, J.C.R. Licklider, director of the Pentagon’s Information Processing Techniques Office (IPTO), spoke of a future “intergalactic computer network” that would serve as the “main...
Read Article
Attacker Productivity: Exploit Misconfigured Identities in the Cloud
“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in...
Read Article
Hunting Azure Blobs Exposes Millions of Sensitive Files
We hear about it all the time – data breaches that expose a company’s sensitive information. Nearly all of us have been warned that our passwords, email addresses or even credit cards have...
Read Article
People, Process and Technology: Six Best Practices for Cloud Least Privilege
If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services...
Read Article