The Benefits of Cloud Entitlement Management

| | Cloud
Cloud identities and entitlements pose grave challenges - learn about the benefits of CIEM solutions and KPIs for measuring them The post The Benefits of Cloud Entitlement Management appeared first on Ermetic ... Read More

Secure Your Cloud – Know the Difference between CSPM and KSPM

| | Cloud
Conventional CSPM tools don’t sufficiently cover K8s clusters – dedicated tools are a must to address Kubernetes’s unique challenges The post Secure Your Cloud – Know the Difference between CSPM and KSPM appeared first on Ermetic ... Read More
AWS Amplify Studio

Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges

| | aws
Learn how an AWS service usage and permissions combination discovered by Ermetic may increase risk upon a certain non-compliance The post Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges appeared first on Ermetic ... Read More

Shared Responsibility Model in the Cloud

| | Cloud
CSPs have embraced a “shared responsibility model” to define the security responsibilities for different components of the architecture The post Shared Responsibility Model in the Cloud appeared first on Ermetic ... Read More
A CIS Kubernetes benchmark exists for each major cloud provider, helping clarify but raising the bar on deploying Kubernetes environments securely

Mastering the Art of Kubernetes Security 

| | Cloud
With Kubernetes’ explosive adoption by the development community comes an urgent need to secure K8s clusters and ensure their compliance effectively The post Mastering the Art of Kubernetes Security  appeared first on Ermetic ... Read More
The many different “faces” of a cloud workload

Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume

| | Cloud
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability The post Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume appeared first on Ermetic ... Read More
Caption: Carry out continuous compliance audit including for CIS, GDPR, HIPAA, ISO, NIST, PCI and SOC2

Managing Cloud Compliance and Security Posture

| | Cloud
Why compliance and access security in the public cloud are so challenging – and how carefully chosen CSPM tools can help The post Managing Cloud Compliance and Security Posture appeared first on Ermetic ... Read More
Figure - Maturity by Organization Size, State of Cloud Security Maturity 2022

Perceived Cloud Security vs. Reality: Test Yourself

| | Cloud
Shun complacency... your cloud security probably needs to be better than you or your organization perceive it to be. The post Perceived Cloud Security vs. Reality: Test Yourself appeared first on Ermetic ... Read More
How to Implement CIEM – A Checklist

How to Implement CIEM – A Checklist

| | Cloud
What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out. The post How to Implement CIEM – A Checklist appeared first on Ermetic ... Read More
Fauda: When Hollywood and Cybersecurity Meet

Fauda: When Hollywood and Cybersecurity Meet

| | Cloud
The newest season of Fauda, now streaming on Netflix, is a real Hollywood meets Cybersecurity moment. Find out how realistic - or not - it is. The post Fauda: When Hollywood and Cybersecurity Meet appeared first on Ermetic ... Read More