Blogs
By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized, invisible, ...
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic environment where ...
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at the Bay Area OWASP ...
By Venkat Raghavan
Over the weekend I read a very interesting and informative blog from AWS “The anatomy of ...
By Ranjan Kunwar What is IGA (Identity Governance and Administration)?
IGA combines Identity Governance and ...
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native ecosystem. The ...
By Ranjan Kunwar In the cloud, access control involves who has access (identities) and what kind of access each ...
Do you know how many ways your cloud data could be exfiltrated?
Possible (and common) answers include:
“I did ...
Problem: Most Cyberattacks Leverage Compromised Identities
Most cyberattacks occur due to compromised identity, ...