Tag - Identity

Identity Security Best Practices for SaaS Apps

Originally published by CyberArk. Written by Sam Flaster. Do you need to secure high-risk access to the back end of your customer-facing apps? Yes, you do – assuming you care about cybersecurity risk, uptime or compliance with SOC II and NIST and AWS, Azure and GCP architecture frameworks. To meet compliance requirements and grow your business, you must properly...

Identity and Access Management in Cloud Security

Written by Ashwin Chaudhary, CEO, Accedere. Identity and access management (IAM) ensures that only authorized identities have the right access to the right resources. With cloud platforms consolidating numerous administrative functions of data centers and services into unified Internet-accessible web consoles and application programming interfaces (APIs), IAM acts as...

Top 4 Non-Human Identity Use Cases

Originally published by Astrix on June 13, 2024. Last week we held an insightful live event featuring our solutions engineer, Michael Silva, and our CISO in Residence, Tim Youngblood. The event focused on the top four non-human identity (NHI) use cases that are crucial for security teams. Here’s a recap of the key points discussed during the session, as well as the...

Cloud Identity Security: Strategies for Protecting Data

Written by Alyssa Miles, CyberArk. There’s currently a cybersecurity adage with varying verbiage and claimed origins – the point, however, is unmistakable: “Attackers don’t break in. They log in.“ This saying underscores the strategic shift associated with cloud adoption’s prominence in shaping the digital landscape. New environments have created new...

What is Non-Human Identity Management? Mastering NHIM

Originally published by Oasis. Non-human identities, or NHIs, serve as digital gatekeepers, enabling secure machine-to-machine and human-to-machine access and authentication within modern enterprise systems. The push for innovation has led to the adoption of microservices, third-party solutions, and cloud-based platforms, creating a complex web of interconnected...

Zero Trust & Identity and Access Management (IAM)

Written by the CSA Identity and Access Management Working Group. In today’s digitally interconnected landscape, understanding the intricacies of Identity and Access Management (IAM) is imperative for safeguarding organizational assets. A looming threat to IAM is Shadow Access. This insidious menace, often exacerbated by the rapid adoption of cloud services and...

Securing GenAI with Non-Human Identity Management

Originally published by Oasis Security. Written by Joel McKown, Solutions Engineer, Oasis Security. There are many inevitabilities in technology, among them is that rapid innovation will introduce unique risks and 3 letter acronyms will abide. Generative AI conversations have become top of mind, as business races to find the most value from a new technological arena...

What’s Broken with Identity Management?

Originally published by Oasis Security. Written by Danny Brickman, Co-founder & CEO, Oasis Security. Identity management is a critical component of enterprise security. Identities are the key construct through which we control how authorized entities (individuals, software or devices) can access data and perform actions. Historically, human identities have the...

Anjali Enjeti on Asian American identity in white-dominant culture – Scalawag

Click to jump to an excerpt from The Parted Earth, below. I first met Anjali Enjeti in the glass-vaulted lobby of Washington, D.C.’s Renaissance Hotel. The author and organizer had mobilized more than 20 Georgia writers attending the 2017 AWP conference to host letter-writing parties in our home communities to deliver to our senators. We received mixed results...