Blogs
News & Updates
How To Secure Your Data Supply Chain with an Identity-First Approach
Digital supply chains and data power our digital economy. Conceptually similar to physical supply chains, digital supply chains interconnect various data systems, data providers and data consumers. Many financial services and banking customers need to share sensitive...
Shadow Access in Your Cloud
By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized, invisible, unsafe and generally over-permissioned access that has grown along with cloud identities, apps and data. Today, identities, human and non-human are...
Guest Post: A Balancing Act – Developer Agility vs Cloud Data Security
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic environment where identities and access are spread across the different systems and generally operates with overly permissive access with lax identity and access management...
OWASP Meetup Discusses Impact of Shadow Access on CI/CD systems
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at the Bay Area OWASP meeting, discussing the topic of "Shadow Access" - an emerging attack vector in the cloud that creates exploitable pathways to an organization's crown...
Commentary on AWS Security Blog “The anatomy of ransomware event targeting data residing in Amazon S3”
By Venkat Raghavan Over the weekend I read a very interesting and informative blog from AWS “The anatomy of ransomware event targeting data residing in Amazon S3 | AWS Security Blog”. This AWS blog lays out the case for ransomware attacks that are targeted at data...
Guest Post: Understanding Identity Governance and Identity Administration in the Cloud
By Ranjan Kunwar What is IGA (Identity Governance and Administration)? IGA combines Identity Governance and Identity Administration. It is a policy framework and set of security solutions that enable organizations to mitigate identity-related access risks within their...
Guest Post: Rethinking “Identity Governance” in the Cloud
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native ecosystem. The ability to seamlessly integrate with API’s and deliver products at an accelerated pace is pretty much a prerequisite to attain scalable, organic and...
Guest Post: Understanding Identity and Access Management (IAM) in the Cloud Era
By Ranjan Kunwar In the cloud, access control involves who has access (identities) and what kind of access each identity has. When it comes to human identities, we have several ways to manage them using 3rd party tools. We can avoid creating an account and depend on...
5 Questions to Predict A Cloud Data Breach
Do you know how many ways your cloud data could be exfiltrated? Possible (and common) answers include: “I did not know there was access.” “That access should not have happened.” “It was a misconfiguration.” “The vulnerability was never patched. It was a Zero-day.”...
How identity and access vulnerabilities create invisible cloud data exfiltration vectors
Problem: Most Cyberattacks Leverage Compromised Identities Most cyberattacks occur due to compromised identity, and cloud environments exponentially exacerbate the situation. Every security professional understands access control - the fundamental process of granting...