Blogs
Guest Post: Rethinking “Identity Governance” in the Cloud
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native...
Guest Post: Understanding Identity and Access Management (IAM) in the Cloud Era
By Ranjan Kunwar In the cloud, access control involves who has access (identities) and what kind...
5 Questions to Predict A Cloud Data Breach
Do you know how many ways your cloud data could be exfiltrated? Possible (and common) answers...
How identity and access vulnerabilities create invisible cloud data exfiltration vectors
Problem: Most Cyberattacks Leverage Compromised Identities Most cyberattacks occur due to...