Click any tag below to further narrow down your results
Links
This article discusses how Teleport offers a vault-free solution for managing privileged access across human, machine, and AI identities. It highlights the benefits of just-in-time access and unified identity control, which enhance security and simplify operations compared to traditional PAM systems.
This article explains how attackers exploit identity relationships to breach systems. It introduces Identity Attack Path Management (APM) as a strategy to visualize and prioritize risks based on attacker behavior, helping organizations focus on the most critical vulnerabilities. It also outlines key components and tools for effective APM.
GEICO significantly reduced its $300 million cloud spending by overhauling its security model. The company shifted from a network-centric approach to an identity-first strategy, allowing for better management of secrets and policies across its hybrid cloud environments.
The article discusses Okta's Identity Security Posture Management (ISPM) platform, which helps organizations identify and address identity-related risks. It offers visibility into both human and machine accounts, highlights security gaps, and automates remediation processes. An interactive demo is available to showcase its features.
This article discusses the rising threat of identity-based attacks and the limitations of traditional security measures. It emphasizes the need for Attack Path Management (APM) to effectively identify and mitigate numerous hidden attack paths created by complex identity systems.
This article outlines common misconfigurations in AWS that can expose cloud resources to unauthorized access. It focuses on two main issues: service exposure and access by design, highlighting specific services like Lambda, EC2, and ECR that can create vulnerabilities. Understanding these risks is essential for effective cloud security management.
This guide explains JSON Web Tokens (JWTs) and their importance in building secure and scalable identity systems. It covers JWT components, use cases, and best practices to mitigate common vulnerabilities.
The article discusses how the increasing complexity of technology stacks has led to engineer burnout due to fragmented identity management and security responsibilities. It argues for a unified identity strategy that automates credential handling and access controls to help engineers focus on their core work.
This guide explains JSON Web Tokens (JWTs) and their significance in building secure and scalable identity systems. It covers JWT structure, advantages, common vulnerabilities, and best practices for implementation.
This article introduces a tool for assessing your organization's identity security through a quick 14-question survey. It evaluates how well you identify and mitigate risks in Active Directory and Entra ID, helping you understand your current maturity level and offering guidance for improvement.
HashiCorp reflects on 2025, highlighting the challenges of cloud complexity faced by organizations across various sectors. Key themes include the need for unified automation, addressing identity sprawl, and leveraging AI to enhance infrastructure management and security.
This article covers how to manage non-human identities (NHIs) using Okta's Identity Security Posture Management (ISPM). It highlights real-time detection of NHI risks, strategies for securing autonomous agents, and a roadmap for rapid deployment. The focus is on practical techniques and visualization tools to enhance security.
This article discusses the risks associated with using static credentials in cloud environments and offers alternatives for managing identities securely. It emphasizes the importance of temporary credentials and modern identity solutions to reduce vulnerabilities and improve security.
This article outlines how zero trust architecture addresses security challenges in cloud-native environments like Kubernetes. It emphasizes the need for strict authentication and authorization at every layer, ensuring that every request is verified regardless of network location. The piece also discusses implementing policies and security measures to protect shared infrastructures.
Iru offers an integrated platform that simplifies IT and security management by unifying endpoint, identity, and compliance solutions. It uses AI to enhance security, streamline operations, and improve the employee experience across various devices. The platform claims to save time and reduce workload for IT teams.
Block's team discusses the Model Context Protocol (MCP), a framework designed to enhance AI agent interactions with various tools and services, focusing on security aspects. They outline misconceptions, the need for secure communication, and the importance of user and agent identity in ensuring safe integrations. The article emphasizes evolving security practices to manage the complexities introduced by AI agents in operational environments.