Shine a light on shadow apps
  • images/c1-blog-03-tips-2400x1350-v2.png

    Best Practices for More Secure AWS IAM

    ·
    Marissa Endres
    AWS IAM can be unwieldy–setting up permissions is complicated and can leave gaps in security when unnecessary access is granted. Learn how to make AWS IAM more secure with best practices for least privilege access controls.
  • images/c1-blog-03-tips-2400x1350-v2.png

    Four Common Mistakes to Avoid When Running User Access Reviews

    ·
    Marissa Endres
    The ultimate goal is to review sensitive or high risk access in a timely fashion to lower standing permissions and achieve least privilege, but there are few common mistakes that have setback many companies on that journey.
  • images/blog-zero-trust-is-winning.png

    What’s Next for Zero Trust?

    ·
    Alex Bovee
    Zero Trust is accepted as a superior technical security architecture for the world outside of the corporate network. So what comes next?
  • images/shift-left.png

    Why Identity Needs to Shift Left

    ·
    Paul Querna
    “Shifting left” has become a critical mindset to fix problems in modern security practice that have remained unsolved, despite increased governance and visibility.
Previous 1 2