By Venkat Raghavan, Founder & CEO, Stack Identity Shadow Access is unmonitored, unauthorized, invisible, unsafe and generally over-permissioned access that has grown along with cloud identities, apps and data. Today, identities, human and non-human are...
By Rupa Parameswaran The cloud software development ecosystem operates in a complex and dynamic environment where identities and access are spread across the different systems and generally operates with overly permissive access with lax identity and access management...
Kicking off 2023 for Stack Identity, our founder and CEO Venkat Raghavan was a guest speaker at the Bay Area OWASP meeting, discussing the topic of “Shadow Access” – an emerging attack vector in the cloud that creates exploitable pathways to an...
By Venkat Raghavan Over the weekend I read a very interesting and informative blog from AWS “The anatomy of ransomware event targeting data residing in Amazon S3 | AWS Security Blog”. This AWS blog lays out the case for ransomware attacks that are targeted at data...
By Ranjan Kunwar What is IGA (Identity Governance and Administration)? IGA combines Identity Governance and Identity Administration. It is a policy framework and set of security solutions that enable organizations to mitigate identity-related access risks within their...
By Siva Inguva It is an unwritten mandate for organizations today to be part of the Cloud Native ecosystem. The ability to seamlessly integrate with API’s and deliver products at an accelerated pace is pretty much a prerequisite to attain scalable, organic and...