Zilla Security hires Melodye Mueller as CMO

Zilla Security hires Melodye Mueller as CMO

Mueller to help grow global presence of Boston-based cloud security startup. BOSTON, March 17, 2022 —  Zilla Security, a provider of an innovative identity and access security platform for the cloud, today announced that it has hired Melodye Mueller as Zilla’s CMO to...
Risky identities: transfers & terminations

Risky identities: transfers & terminations

Shadowy cyber criminal and ransomware gangs may be scary. But your biggest cloud risk likely comes from people you already know: current and former employees with access to sensitive systems and data. When more than 450 virtual machines running Cisco’s WebEx Teams...
Risky identities: APIdentities

Risky identities: APIdentities

Attacks on APIs are on the rise. Organizations need to worry about the risk posed by API-linked identities within their environments. In our previous Risky Identities posts, we have talked about the threats posed to your organization by some of the “usual suspects,”...
Risky identities: Third parties

Risky identities: Third parties

The concept of third party risk isn’t new. As far back as the 2013 hack of Target Stores, risks associated with third party access to enterprise environments were well understood. (That attack resulted in the theft of data on 40 million Target customers and began with...
Risky identities: orphaned accounts

Risky identities: orphaned accounts

More cloud applications and platforms means more orphaned accounts. We talk about why that’s a problem – and what to do about it.  In August of 2017, unknown attackers compromised front-end workstations on Singapore Health’s (SingHealth’s) IT network. The...