By Venkat Raghavan Over the weekend I read a very interesting and informative blog from AWS “The anatomy of ransomware event targeting data residing in Amazon S3 | AWS Security Blog”. This AWS blog lays out the case for ransomware attacks that are targeted at data...
By Ranjan Kunwar What is IGA (Identity Governance and Administration)? IGA combines Identity Governance and Identity Administration. It is a policy framework and set of security solutions that enable organizations to mitigate identity-related access risks within their...
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native ecosystem. The ability to seamlessly integrate with API’s and deliver products at an accelerated pace is pretty much a prerequisite to attain scalable, organic and...
By Ranjan Kunwar In the cloud, access control involves who has access (identities) and what kind of access each identity has. When it comes to human identities, we have several ways to manage them using 3rd party tools. We can avoid creating an account and depend on...
Do you know how many ways your cloud data could be exfiltrated? Possible (and common) answers include: “I did not know there was access.” “That access should not have happened.” “It was a misconfiguration.” “The vulnerability was never patched. It was a Zero-day.”...
Problem: Most Cyberattacks Leverage Compromised Identities Most cyberattacks occur due to compromised identity, and cloud environments exponentially exacerbate the situation. Every security professional understands access control – the fundamental process of...