Archives

  1. It All Comes Back to Access: How to Establish Cloud Identity Security in 2024

  2. The Broken State of Least Privilege: Reimagining a New Approach

  3. Ditch Siloed IAM – Convergence is Key to Driving Optimum Cloud Security

    For today’s enterprises, the demands of securing hybrid workforces, cloud environments, and digital transformation initiatives have placed identity at the center of strategic discussions about security. Identity is the link that connects users to the devices, services, and applications they use during a time when the traditional perimeter has been eroded. But managing identity and…

  4. Best Practice: Enabling Visibility as Part of Cloud Infrastructure Entitlements Management (CIEM)

    Today’s modern enterprises rely heavily on cloud infrastructure, and permissions are essentially the backbone of access to cloud based resources. To effectively manage entitlements – access to your organization’s resources such as sensitive data and mission critical assets – the core proficiencies you need are: access to an inventory of all your cloud identities and…

  5. Is Your Cloud Security Starting to Feel like A Game of Whac-A-Mole?

    Whac-A-Mole is a timeless arcade classic with a simple goal: when a mole pops up, whack it back into its hole. Inevitably, however, a few of those pesky, popping creatures seem to evade the wrath of the jumbo cushioned mallet at the very last second. I was reminded of this game when I read a recent…

  6. The Most Sensitive Cloud Configuration You’re Ignoring

    Why managing identities and entitlements is so important to securing your cloud infrastructure First, a parableA wolf sneaks into an organization’s cloud infrastructure (Grandma’s house). It compromises an identity (Grandma) and uses its excessive entitlements to devour sensitive data (Little Red Riding Hood). Why didn’t the organization’s cloud security mechanisms stop the wolf in the…

  7. A Single Identity Management and Security Strategy for Hybrid Clouds

    Hybrid IT environments are becoming the exception and not the rule. Cloud adoption has transformed more than business operations; it has also transformed how businesses need to address identity management and security. Today’s identity teams and cloud architecture specialists are facing a myriad of challenges. In my new paper—“Multi-Cloud Access Management Done Well – Myth…

  8. Why Hybrid IT Environments Need IGA

    An increasing number of organizations are adopting a mix of cloud-based and on-premises applications – a move which has been accelerated by the need for employees to work remotely. The ever-prescient Gartner saw this shift coming pre-pandemic and predicted that in 2021, more than 75% of midsize and large organizations would have adopted some kind of multi-cloud…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.