Oct 6, 2023 | Uncategorized
When I talk to customers and partners, I often get questions about the plethora of point solutions related to identity security and how they differ from one another. The growing alphabet soup of industry acronyms has made it increasingly difficult for overloaded...
Apr 12, 2023 | Blog, Uncategorized
Over the last few years, several high-profile data breaches have rocked the tech industry, specifically targeting cloud infrastructure. Many of these attacks started on servers hosted in Amazon Web Services (AWS) and successfully bypassed all the security controls. In...
Mar 17, 2023 | Uncategorized
Identity governance and administration (IGA) is a critical part of any organization’s security posture. Monitoring, controlling, and managing user access to ensure that only authorized personnel have access to sensitive information or resources is an integral...
Mar 11, 2023 | Uncategorized
On April 1, 2021, San Francisco-based technology company CodeCov discovered that attackers had compromised its software platform, which over 29,000 customers use worldwide to test software code. While that was troubling enough, the tampering reportedly started back in...
Jan 20, 2023 | Uncategorized
The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights necessary to perform their designated function. This principle reduces the risk of security breaches and unauthorized access by...
Dec 13, 2022 | Uncategorized
We recently wrote a blog on Cloud infrastructure entitlement management (CIEM) and a new set of challenges it poses for organizations. Once you move applications and services to the cloud, role-based privileges aren’t as simple as they seem. In addition to users who...