Archives

  1. Elevating Cloud Security with CIEM Best Practices

  2. Best Practices for Cloud Infrastructure Entitlement Management (CIEM)

  3. CIEM 101: Understanding CIEM Fundamentals for Effective Multicloud Security Enablement

  4. Best Practice: Enabling Visibility as Part of Cloud Infrastructure Entitlements Management (CIEM)

    Today’s modern enterprises rely heavily on cloud infrastructure, and permissions are essentially the backbone of access to cloud based resources. To effectively manage entitlements – access to your organization’s resources such as sensitive data and mission critical assets – the core proficiencies you need are: access to an inventory of all your cloud identities and…

  5. Reeling in the Greatest Security Risk to Your Cloud Infrastructure – Identities

  6. Is Your Cloud Security Starting to Feel like A Game of Whac-A-Mole?

    Whac-A-Mole is a timeless arcade classic with a simple goal: when a mole pops up, whack it back into its hole. Inevitably, however, a few of those pesky, popping creatures seem to evade the wrath of the jumbo cushioned mallet at the very last second. I was reminded of this game when I read a recent…

  7. The Most Sensitive Cloud Configuration You’re Ignoring

    Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.