Archives
-
Going back to Zero: A Primer on Zero Trust
We are here to talk about going back to Zero!!! Today’s enterprises are home to hundreds of applications that are critical to their core business. However, a paradigm shift in the landscape of Information Technology due to cloud adoption, remote workforce, and mobility has forced organizations to rethink their security approach to keep bad actors…
-
Eyes Without a Face, Got No Human Grace
Why both Cybersecurity and IAM require Identity-centric Behavioral Analytics using modern Machine Learning approaches. “Eyes without a face…got no human grace…your eyes without a face…” The British punk-rocker Billy Idol said it all in his 1983 song about the most prominent problem today enterprise’s face when using cybersecurity technologies. They detect footprints, sometimes stretching to the…
-
Does the Presidential Executive Order Reinforce Zero Trust and Identity Defined Security?
In May, US President Joe Biden’s executive order on cybersecurity marked the launch of an ambitious, in-depth approach to improving the digital defenses of the federal government in the wake of multiple sophisticated attacks on the public and private sector. Biden’s order covered significant ground, including strengthening software supply chain security and implementing data encryption. But what…
-
The Most Sensitive Cloud Configuration You’re Ignoring
Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…