Blogs
![How to Transform User Access Reviews To Meet The Challenges of the Cloud and AI Era](https://stackidentity.com/wp-content/uploads/2023/12/challenges-of-cloud-ai-era.png)
Four transformational approaches to improve the efficacy and efficiency of User Access Reviews - a foundational ...
![Webinar Recap: Shadow Access: Where IAM Meets Cloud Security](https://stackidentity.com/wp-content/uploads/2023/10/shadow-access.png)
Earlier this month, Ken Foster, VP of IT Governance, Risk and Compliance - FLEETCOR and Al Ghous, former CISO ...
![Stack Identity Shadow Access Impact Report: How Identity and Access are Disrupting Cloud Security, Compliance and Governance](https://stackidentity.com/wp-content/uploads/2023/08/Stack-Identity-Shadow-Access-Impact-Report.jpg)
Summary: This Stack Identity Shadow Access Report outlines the risks created by thousands of dynamically changing ...
![Navigating the SOC-2 Process: A Start-Up’s Experience wrt Governance, Administration and Audit](https://stackidentity.com/wp-content/uploads/2023/05/SOC-2-Blog-Image.jpg)
We understand the importance of security and wanted to start with SOC-2 compliance to implement basic security for our environment.
![Stack Identity and AWS partner for continuous monitoring and remediation of Shadow Access in public and data cloud environments](https://stackidentity.com/wp-content/uploads/2023/05/stack-identity-aws-apn-blog-thumb.png)
Stack Identity has achieved Validated Partner status and passed the AWS Foundational Technical Review for its ...
![LastPass Breach Investigation: An Analysis Through the Lens of Cloud IAM Operations](https://stackidentity.com/wp-content/uploads/2023/04/lastpass-breach-iam-ops-analysis-featured-img.png)
By Venkat Raghavan and Dr.Prakash Shetty
This report is an analysis of IAM activities undertaken by the ...
![How PagerDuty and Stack Identity Ensure Timely Notification of Cloud Data Breach Risks](https://stackidentity.com/wp-content/uploads/2023/04/pagerduty-featured-image.png)
By Stuart Horne Security teams complain that they are overwhelmed with existing cyber security initiatives when it ...
![How To Secure Your Data Supply Chain with an Identity-First Approach](https://stackidentity.com/wp-content/uploads/2023/03/how-to-secure-data-supply-thumb.jpg)
Digital supply chains and data power our digital economy. Conceptually similar to physical supply chains, digital ...
![Shadow Access in Your Cloud](https://stackidentity.com/wp-content/uploads/2023/03/shadow-access-in-our-cloud-blog.jpeg)
By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized, invisible, ...
![Guest Post: A Balancing Act – Developer Agility vs Cloud Data Security](https://stackidentity.com/wp-content/uploads/2023/03/balancing-developer-agility-with-cloud-data-security-blog.png)
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic environment where ...
![OWASP Meetup Discusses Impact of Shadow Access on CI/CD systems](https://stackidentity.com/wp-content/uploads/2023/03/owsap-thumb.png)
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at the Bay Area OWASP ...
![Commentary on AWS Security Blog “The anatomy of ransomware event targeting data residing in Amazon S3”](https://stackidentity.com/wp-content/uploads/2023/02/venkat-blog-feature.png)
By Venkat Raghavan
Over the weekend I read a very interesting and informative blog from AWS “The anatomy of ...