The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…
Archives
-
Ditch Siloed IAM – Convergence is Key to Driving Optimum Cloud Security
For today’s enterprises, the demands of securing hybrid workforces, cloud environments, and digital transformation initiatives have placed identity at the center of strategic discussions about security. Identity is the link that connects users to the devices, services, and applications they use during a time when the traditional perimeter has been eroded. But managing identity and…
-
Best Practice: Enabling Visibility as Part of Cloud Infrastructure Entitlements Management (CIEM)
Today’s modern enterprises rely heavily on cloud infrastructure, and permissions are essentially the backbone of access to cloud based resources. To effectively manage entitlements – access to your organization’s resources such as sensitive data and mission critical assets – the core proficiencies you need are: access to an inventory of all your cloud identities and…
-
Is Your Cloud Security Starting to Feel like A Game of Whac-A-Mole?
Whac-A-Mole is a timeless arcade classic with a simple goal: when a mole pops up, whack it back into its hole. Inevitably, however, a few of those pesky, popping creatures seem to evade the wrath of the jumbo cushioned mallet at the very last second. I was reminded of this game when I read a recent…
-
The Most Sensitive Cloud Configuration You’re Ignoring
Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…
-
A Single Identity Management and Security Strategy for Hybrid Clouds
Hybrid IT environments are becoming the exception and not the rule. Cloud adoption has transformed more than business operations; it has also transformed how businesses need to address identity management and security. Today’s identity teams and cloud architecture specialists are facing a myriad of challenges. In my new paper—“Multi-Cloud Access Management Done Well – Myth…
-
Why Hybrid IT Environments Need IGA
An increasing number of organizations are adopting a mix of cloud-based and on-premises applications – a move which has been accelerated by the need for employees to work remotely. The ever-prescient Gartner saw this shift coming pre-pandemic and predicted that in 2021, more than 75% of midsize and large organizations would have adopted some kind of multi-cloud…