least privilege
Assuming Roles in the Public Cloud: The Good, The Bad, and the Insecure
Migrating resources to the public cloud, also known as the “shift-left” mentality, helps organizations to optimize their infrastructure, resources, and staffing, as well as reduce overhead ...
More Cloud Identities, More Problems
Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past year, according to the ...
Securing Against Supply Chain Attacks
Anyone who has been in IT for the last decade knows the risks posed by ransomware and cyberattacks. They have been on our radar as a top concern for many years. But ...
Cloud Security: Maintaining Least Privilege
Reading Time: 8 minutes There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations ...
2022 Gartner Hype Cycle: Representative Vendor for CIEM
Reading Time: 3 minutes CIEM is at the peak of its ascent, according to Gartner. The analyst’s ‘Hype Cycle for Workload and Network Security, 2022’ was published recently by author Charlie Winckless ...
How To Detect Privilege Escalation: An Attack Simulation
Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...
Avoid AWS Effective Permissions Pitfalls
Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...
Leveraging Least Privilege in Data Breach Management
Looking back over the past 6 years, and being focused primarily on cloud security with organizations of all sizes and […] The post Leveraging Least Privilege in Data Breach Management appeared first ...
Practicing The Principle of Least Privilege in Google Cloud
Access management is a fundamental requirement in achieving security, especially with cloud infrastructure. Think of it this way: You wouldn't […] The post Practicing The Principle of Least Privilege in Google Cloud ...
Least Privilege Policy in the Cloud
Maintaining cloud security is paramount for every organization, regardless of size. One of the biggest problems companies face regarding cybersecurity […] The post Least Privilege Policy in the Cloud appeared first on ...