Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in…
The post Attacker Productivity: Exploit Misconfigured Identitie… Continue reading Attacker Productivity: Exploit Misconfigured Identities in the Cloud

People, Process and Technology: Six Best Practices for Cloud Least Privilege

If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services…
The post People, Process and Technology: Six Best Pr… Continue reading People, Process and Technology: Six Best Practices for Cloud Least Privilege