Skill Level: Learner

CIEM vs. PAM: Know the Difference
Reading Time: 8 minutes CIEM vs. PAM: Know the Differences in the Cloud Identity Solutions With so many varying environments – cloud, on-premises, and hybrid – and numerous security priorities, there are ...

9 Common IAM Risks & How to Mitigate Them
Reading Time: 6 minutes 9 Common IAM Risks and How To Mitigate Them If Identity and Access Management is on your mind, you’re not alone. Recognizing a weak point and seeking out ...

The Shared Responsibility Model in the Cloud
Reading Time: 6 minutes The Shared Responsibility Model in the Cloud Gartner predicts that through 2025, 99% of all cloud security failures will be the customer’s fault. A statistic like this can ...

More Cloud Identities, More Problems
Reading Time: 4 minutes It’s no secret large enterprises are struggling to manage cloud identities. In fact, 84% of organizations faced an identity-related security breach in the past year, according to the ...

You’ve Got Identity Blindspots in Your Cloud
Reading Time: 5 minutes You’ve got identity blindspots in your cloud. It’s inevitable. But how did we get there? And what are these blindspots? The enterprise departure from on-prem datacenters to cloud ...

Cloud Security: Maintaining Least Privilege
Reading Time: 8 minutes There are four main identity risks that determine the necessity of least privilege. These include the separation of duty, dormant identities, privilege escalation, and toxic combinations ...

Webinar Recap: Prioritizing Vulnerabilities with Contextual Insights
Reading Time: 4 minutes This past week, Principal Security Architect, Nathan Schmidt, presented a webinar on the value of prioritizing cloud vulnerabilities, why it’s necessary specific to the cloud, and tactical next ...

Key Benefits of Agentless Cloud Security
Reading Time: 4 minutes In the early days of risk detection, if your security team wanted an intimate understanding of their on-prem infrastructure and means to secure it, they needed to bring ...

Vulnerability Management in the Cloud
Reading Time: 7 minutes In today’s fast-moving cloud workload security environments, decision-makers are grappling with misconfigurations and vulnerabilities in the cloud. Good vulnerability management in the cloud requires a different approach than ...

Your Organization Has Cloud Sprawl
Reading Time: 8 minutes As your organization grows, so does your reliance on cloud services. But with that growth comes the risk of cloud sprawl — when too many cloud services are ...