Earlier this month, Ken Foster, VP of IT Governance, Risk and Compliance – FLEETCOR and Al Ghous, former CISO Snapdocs, Advisor, and Investor, had an open conversation with our founder Venkat Raghavan about the rampant risks of unauthorized access in cloud...
Summary: This Stack Identity Shadow Access Report outlines the risks created by thousands of dynamically changing cloud identities and associated access permissions. It provides key statistics and insights on how the security of cloud environments are at risk of the...
Stack Identity has achieved Validated Partner status and passed the AWS Foundational Technical Review for its automated cloud IAM operations platform. The Stack Identity platform detects the dynamically changing yet recurring risk of data exfiltration, and helps...
By Venkat Raghavan and Dr.Prakash Shetty This report is an analysis of IAM activities undertaken by the threat actor in the LastPass breach; the source of this analysis is the publicly reported incident timeline from LastPass. Introduction to the Analysis of the...
By Stuart Horne Security teams complain that they are overwhelmed with existing cyber security initiatives when it comes to dealing with emerging new attack vectors. Yet one of the newest attack vectors – Shadow Access (resulting from poorly managed IAM...