4 min
Cloud Security
Cloud IAM Done Right: How LPA Helps Significantly Reduce Cloud Risk
Today almost all cloud users, roles, and identities are overly permissive. To minimize risk, you need to adopt the principle of least privilege access.
4 min
Cloud Security
3 Key Challenges for Cloud Identity and Access Management
Here are three of the main challenges that security teams face when implementing a cloud IAM solution, as well as some strategies to help tackle them.
2 min
Threat Intel
Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls
The Lapsus$ ransomware gang’s modus operandi seems to be evolving.
3 min
Identity Access Management
All about the boundaries: The cloud IAM lifecycle approach
Implementing cloud Identity Access Management (IAM) boundaries can seem like an oxymoron in the midst of rapid growth or need for access as new personnel, teams, or supply-chain partners come online.