The explosion of identities, permissions, and credentials is sweet music for attackers and adversaries. They don’t need to hack into systems, they can simply log in with legitimate access. We have seen this singular pattern from the massive Capital One data breach in...
Four transformational approaches to improve the efficacy and efficiency of User Access Reviews – a foundational aspect of Identity and Access Governance Author Ken Foster, VP of IT Governance, Risk and Compliance, FLEETCOR Venkat Raghavan, Founder and CEO, Stack...
Earlier this month, Ken Foster, VP of IT Governance, Risk and Compliance – FLEETCOR and Al Ghous, former CISO Snapdocs, Advisor, and Investor, had an open conversation with our founder Venkat Raghavan about the rampant risks of unauthorized access in cloud...
Summary: This Stack Identity Shadow Access Report outlines the risks created by thousands of dynamically changing cloud identities and associated access permissions. It provides key statistics and insights on how the security of cloud environments are at risk of the...
We are in the business of identity and access governance for cloud native applications and have built a SaaS platform to offer our solution. We understand the importance of security and wanted to start with SOC-2 compliance to implement basic security for our...
Stack Identity has achieved Validated Partner status and passed the AWS Foundational Technical Review for its automated cloud IAM operations platform. The Stack Identity platform detects the dynamically changing yet recurring risk of data exfiltration, and helps...