Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked inside that…
The post Hard-Coded Credentials: The Not-So-Se… Continue reading Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in…
The post Attacker Productivity: Exploit Misconfigured Identitie… Continue reading Attacker Productivity: Exploit Misconfigured Identities in the Cloud

People, Process and Technology: Six Best Practices for Cloud Least Privilege

If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services…
The post People, Process and Technology: Six Best Pr… Continue reading People, Process and Technology: Six Best Practices for Cloud Least Privilege

Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Editor’s Note: This is part three of a blog series on securing privileged access and identities in the cloud. Part 1: Five Best Practices for Securing Privileged Access and Identities for the Cloud Management Console Part…
The post Secure Your Cloud … Continue reading Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Best Practices for Protecting Your Organization’s Dynamic Cloud Infrastructure

Editor’s Note: This is part two of a blog series on securing privileged access and identities in the cloud. Read part one on securing the root-level account and cloud management console here. A major benefit…
The post Best Practices for Protecting Yo… Continue reading Best Practices for Protecting Your Organization’s Dynamic Cloud Infrastructure

5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console

Over the next few weeks, we’ll explore best practices for securing privileged accounts and identities in common cloud scenarios. This series can help guide effective risk reduction strategies for today and for the future as…
The post 5 Best Practices… Continue reading 5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console

Cloud Opportunities Drive Security-as-a-Service Adoption

The power of human connection has been highlighted during this dramatic shift in the way we live and work. From afar, families are sharing stories and laughter via video chats, co-workers are holding virtual happy…
The post Cloud Opportunities Drive … Continue reading Cloud Opportunities Drive Security-as-a-Service Adoption

5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business

The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age…
The post 5 Keys to Securi… Continue reading 5 Keys to Securing Business Critical Applications in an Age of Digital Transformation: Keeping Your Organization Running at the Speed of Business