Five Lessons Every Cybersecurity Team Can Learn from the Uber Incident
Upon hearing of a cyber security incident, alleged or factual, the most productive thing to do is learn what you…
Why It’s Important to Take Notice of AWS IAM Roles Anywhere
IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of…
Reducing the Risk from Misused AWS IAM User Access Keys
Used incorrectly, AWS IAM User Access Keys can pose high risk; the good news is that great alternatives, explored here,…
IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of Best Practices for Cloud Infrastructure Entitlement Management.
96% Could Have Prevented Their Identity Breach – IDSA
Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they…
Facing the Shift-Left Security Conundrum. A True Story
Shift left security is hot – until it’s not. Dynamic business requirements and cloud complexity pose major least privilege challenges.
DevSecOps: An Organizational Fix for Improving Cloud Security – Friction-free
By implementing the DevSecOps culture, tools and training, you’ll be on your way to more shift left security and less…
How to Wrap Your Cybersecurity Plan around an Attacker’s Mindset
Is an attacker interested in your organization? Probably. Deconstructing the PoV of cyber attackers is key to defending your turf.
Cloud Native and the Hype of Security
Through proper understanding and support, your organization can ensure it is secure while operating in the cloud and start taking…
6 Tips for Successfully Securing Your AWS Environment
Top six actions and practices you can take to protect your AWS environment today.
Access Undenied on AWS
Ermetic is launching a new open-source tool: Access Undenied on AWS. The tool parses AWS AccessDenied CloudTrail events, explains the…
Keep Your S3 Safe from CloudTrail Auditors
AWSCloudTrailReadOnlyAccess currently allows s3:GetObject for “*” and s3:ListAllMyBuckets – and reading CloudTrail logs may also give access to bucket object…
Access Keys: An Unintended Backdoor-by-Design to Azure Storage Accounts Data
The importance of understanding the assignments of Azure resource roles when giving permissions.
The ABCs of Azure Identity Governance Tools
The main Azure mechanisms for governing identities and providing access permissions.
Deconstructing Azure Access Management using RBAC
The basics of Azure RBAC — the main mechanism in Azure for granting permissions to resources.