Blogs
How To Secure Your Data Supply Chain with an Identity-First Approach
Digital supply chains and data power our digital economy. Conceptually similar to physical supply...
Shadow Access in Your Cloud
By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized,...
Guest Post: A Balancing Act – Developer Agility vs Cloud Data Security
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic...
OWASP Meetup Discusses Impact of Shadow Access on CI/CD systems
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at...
Commentary on AWS Security Blog “The anatomy of ransomware event targeting data residing in Amazon S3”
By Venkat Raghavan Over the weekend I read a very interesting and informative blog from AWS “The...
Guest Post: Understanding Identity Governance and Identity Administration in the Cloud
By Ranjan Kunwar What is IGA (Identity Governance and Administration)? IGA combines Identity...
Guest Post: Rethinking “Identity Governance” in the Cloud
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native...
Guest Post: Understanding Identity and Access Management (IAM) in the Cloud Era
By Ranjan Kunwar In the cloud, access control involves who has access (identities) and what kind...
5 Questions to Predict A Cloud Data Breach
Do you know how many ways your cloud data could be exfiltrated? Possible (and common) answers...
How identity and access vulnerabilities create invisible cloud data exfiltration vectors
Problem: Most Cyberattacks Leverage Compromised Identities Most cyberattacks occur due to...