
Protect your organization from software supply chain attacks
On April 1, 2021, San Francisco-based technology company CodeCov discovered that attackers had compromised its software platform, which over 29,000 …
On April 1, 2021, San Francisco-based technology company CodeCov discovered that attackers had compromised its software platform, which over 29,000 …
The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights …
To gain broad adoption, CIEM must provide convenience for developers and support a fast pace of innovation. This article will dive into organizational friction between security and development teams and ways to align their interests through simple and intuitive workflows.
The most significant attack vectors globally are compromised credentials and weak access policies. Implementing IAM and following the IAM best practices can significantly improve your overall security posture.
Zilla Security helps organizations evolve from legacy IGA solutions to a scalable Identity Security Platform.
Zilla helps users understand identity security and how their services can help.
I’m excited to announce that Zilla Security has closed a $13.5M Series A venture round with Tola Capital, FirstMark Capital, …
Cloud infrastructure entitlement management (CIEM) poses a new set of challenges for organizations. Once you move applications and services to …
Zilla Security hires Melodye Mueller as CMO to drive growth.
Shadowy cyber criminal and ransomware gangs may be scary. But your biggest cloud risk likely comes from people you already …