Britive Announces Partnership With Snowflake

Britive’s Multi-Cloud Privileged Access Management Platform helps Snowflake customers analyze and right-size cloud infrastructure privileges together with their security data lake LOS ANGELES, Sept. 22, 2021 /PRNewswire/ — Britive, the cloud native, Multi-Cloud Privileged Access Management Platform, today announced a partnership with Snowflake, the Data Cloud company, to launch a ‘Bring Your Own Snowflake’ program. … Read more

How Britive Achieves Just-In-Time Privileges in Multi-Cloud

Just-In-Time Privileges In multi-cloud environments, it’s not possible to ringfence every application, resource, device, or user. Digital identity defines the new perimeter. The problem is that this new environment has made managing access privileges magnitudes more critical than ever before. Here is why many in the cybersecurity community are starting to look to approaches based … Read more

What Organizations Need to Know about “Weakening Cloud Security”

Cloud Security Unit 42 at Palo Alto Networks released an important report last week highlighting the increased risks organizations face due to deficient security surrounding Identity and Access Management (IAM) in cloud environments. The report follows their 2020 Cloud Threat Report and found that “cloud environments are more susceptible to attacks today than in October … Read more

Protecting Machine IDs in Multi-Cloud: 5 Techniques

The following article first appeared in eWeek. Automation through digital transformation initiatives that rely on cloud-based applications is driving a surge in the use of machine identities (IDs). Indeed, machine identities outnumber human identities by at least 3-to-1. And while machine IDs drive productivity by completing tasks quickly and without error, such widespread use – … Read more

Latest T-Mobile Attack Shows the Need for Zero Standing Privileges

Zero Standing Privileges The T-Mobile hack that occurred last week underscored the need for organizations to enforce least privilege access to achieve zero standing privileges as soon as possible. While many details of the hack remain unclear, the person identifying as the attacker claimed on Twitter that T-Mobile misconfigured a gateway GPRS support node that … Read more