By Venkat Raghavan and Dr.Prakash Shetty This report is an analysis of IAM activities undertaken by the threat actor in the LastPass breach; the source of this analysis is the publicly reported incident timeline from LastPass. Introduction to the Analysis of the...
By Stuart Horne Security teams complain that they are overwhelmed with existing cyber security initiatives when it comes to dealing with emerging new attack vectors. Yet one of the newest attack vectors – Shadow Access (resulting from poorly managed IAM...
Digital supply chains and data power our digital economy. Conceptually similar to physical supply chains, digital supply chains interconnect various data systems, data providers and data consumers. Many financial services and banking customers need to share sensitive...
By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized, invisible, unsafe and generally over-permissioned access that has grown along with cloud identities, apps and data. Today, identities, human and non-human are...
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic environment where identities and access are spread across the different systems and generally operates with overly permissive access with lax identity and access management...
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at the Bay Area OWASP meeting, discussing the topic of “Shadow Access” – an emerging attack vector in the cloud that creates exploitable pathways to an...