Identity & IAM

How To Minimize Your Cloud Breach Blast Radius
Reading Time: 5 minutes Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud ...

Cloud Security: Maintaining Least Privilege
Reading Time: 8 minutes There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations ...

Attack Path Analysis: Breaking Down Paths To Your Data
Reading Time: 5 minutes If you’re not focused on identity and access controls, then you are running blind to today’s threat landscape. Today, identity is what creates a pathway to your sensitive ...

Effective Permissions: Fact vs. Fiction
Reading Time: 5 minutes Understand the difference between fact and fiction when it comes to your effective permissions reducing complexity in your public cloud ...

Azure Identity Governance & Security
Reading Time: 6 minutes With 84% of companies experiencing an identity-related breach in the previous year, you’re making the right choice by seeking out azure identity governance and security knowledge. That concerning ...

Identity Governance and Administration (IGA): Is it enough?
Reading Time: 11 minutes According to the Identity Defined Security Alliance (IDSA)’s study, ”Identity Security: A Work in Progress,” 94% of organizations experienced a data breach, and 79% were breached in the ...

Real Life Examples of AWS and Azure Privilege Escalation
Reading Time: 8 minutes AWS and Azure privilege escalation attacks are one of the many dangers of managing identities in the cloud. Identity is the new stepping stone for bad actors to ...

Privilege Escalation Types and Attack Paths
Reading Time: 7 minutes Every day we see new vulnerabilities being reported that could allow an attacker access to your data, which means it’s time for you to take action. This article ...

How To Detect Privilege Escalation: An Attack Simulation
Reading Time: 8 minutes Beyond learning what privilege escalation is – an identity, whether it is a user or piece of compute, gaining access to rights or privileges beyond what’s intended for ...

Capital One Data Breach Update: Former Amazon Engineer Convicted
Reading Time: 4 minutes The Office of the Comptroller of the Currency (OCC) issued a Consent Order against Capital One Bank including a civil money penalty for $80,000,000 from a data breach ...