2022 Cybersecurity Excellence Awards Britive Gold Medal for Cloud Privilege Access Management
The 2022 Cybersecurity Excellence Awards has given Britive the “Cloud Privileged Access Management Gold Medal.” The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. With over 900 entries in more than 250 award categories, the 2022 Cybersecurity Excellence Awards program is highly competitive. All winners reflect the
Cloud Secrets Manager
“Hard-coded secrets embedded in source code and scattered throughout the DevOps pipeline pose significant risk. Technical professionals responsible for DevSecOps must introduce tools that securely store and manage secrets and enforce access controls without disrupting automated DevOps workflows.” –Gartner Q: What Problem Does Britive Cloud Secrets Manager Solve? A: Secrets sprawl. Secrets Sprawl /see-krits sprawl/
How Zero Standing Permissions Clear the Way for Zero Trust
Using Zero Standing Permissions to Achieve a Zero Trust Model There is a reason the security community is embracing the zero trust (ZT) principle with renewed energy – because it helps prevent breaches by eliminating implicit trust from a system’s architecture. Instead of automatically trusting users inside a network, ZT dictates that every access point
Cloud IAM: Using Privilege Right Sizing to Contain Privilege Sprawl
Advancing Cloud IAM The following article was published in betanews. Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn’t working. To find out more about why the cloud needs a new approach to IAM we spoke
How to Offboard Cloud Users Securely
This article originally appeared in Security Boulevard. Offboard Cloud Users Securely One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, the failure of so many organizations to revoke standing access privileges to
Cyber Burnout: How to Build Cybersecurity Teams that Are Focused, Optimistic, and Satisfied
The following article originally appeared in eWeek. Cyber Burnout Cloud security professionals are already in short supply. Combine that with alert fatigue, a surge in demand, and the “always-on” nature of the modern workplace, and it is clear why employee burnout is increasing. In 2019, Gartner projected that the cloud market would grow to $355B
Latest news & blog articles
Watch: How to Enforce Defense-in-Depth
Authentication and authorization are often bound together – when human and/or non-human IDs are authenticated,
Watch the Demo: Just-In-Time Access for Snowflake Roles and Databases
Just-in-Time Access for Snowflake We are excited to share that Britive now offers Just-in-Time (JIT)
New Gartner Report: “Reduce Risk Through a Just-In-Time Approach to Privileged Access Management”
Privileged Access Management A recent report issued by Gartner encourages organizations to employ a Just-In-Time