Jul 11, 2022 | Uncategorized
Cloud infrastructure entitlement management (CIEM) poses a new set of challenges for organizations. Once you move applications and services to the cloud, role-based privileges aren’t as simple as they seem. In addition to users who have access to the cloud, there...
Mar 17, 2022 | Uncategorized
Mueller to help grow global presence of Boston-based cloud security startup. BOSTON, March 17, 2022 — Zilla Security, a provider of an innovative identity and access security platform for the cloud, today announced that it has hired Melodye Mueller as Zilla’s CMO to...
Mar 3, 2022 | Uncategorized
Shadowy cyber criminal and ransomware gangs may be scary. But your biggest cloud risk likely comes from people you already know: current and former employees with access to sensitive systems and data. When more than 450 virtual machines running Cisco’s WebEx Teams...
Nov 11, 2021 | Uncategorized
Attacks on APIs are on the rise. Organizations need to worry about the risk posed by API-linked identities within their environments. In our previous Risky Identities posts, we have talked about the threats posed to your organization by some of the “usual suspects,”...
Oct 28, 2021 | Uncategorized
The concept of third party risk isn’t new. As far back as the 2013 hack of Target Stores, risks associated with third party access to enterprise environments were well understood. (That attack resulted in the theft of data on 40 million Target customers and began with...
Sep 9, 2021 | Uncategorized
More cloud applications and platforms means more orphaned accounts. We talk about why that’s a problem – and what to do about it. In August of 2017, unknown attackers compromised front-end workstations on Singapore Health’s (SingHealth’s) IT network. The...