Our blog
Overcoming the Security Challenges of Workforce Offboarding
We all know that onboarding a new employee or contractor involves creating a digital identity for them...
Announcing Zilla Security’s Expert-Led Identity Security Series
We’re thrilled to announce the launch of Zilla Security's Identity Security Series! In this informative...
Navigating SOC 2 compliance on AWS: A survival guide
Service Organization Control 2 (SOC 2) compliance holds a pivotal role in the realm of cybersecurity....
3 ways to tackle misconfigurations in your SaaS and cloud
In today's rapidly evolving digital landscape, public cloud security breaches due to misconfigurations...
The vital role of Segregation of Duties in cybersecurity and compliance
Segregation of Duties (SoD) is a fundamental internal control principle that aims to reduce the risk of...
Identity security complements cloud security posture management
Cloud Security Posture Management (CSPM) solutions help you secure your cloud platforms and your...
AWS infrastructure security: Top 6 must-know best practices
Over the last few years, several high-profile data breaches have rocked the tech industry, specifically...
User access reviews and compliance: The auditor’s perspective
Protecting company assets and maintaining control over access to and usage of these assets is a critical...