2022 Cybersecurity Excellence Awards Britive Gold Medal for Cloud Privilege Access Management
The 2022 Cybersecurity Excellence Awards has given Britive the “Cloud Privileged Access Management Gold Medal.” The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security. With over 900 entries in more than 250 award categories, the 2022 Cybersecurity Excellence Awards program is highly competitive. All winners reflect the
Cloud Secrets Manager
“Hard-coded secrets embedded in source code and scattered throughout the DevOps pipeline pose significant risk. Technical professionals responsible for DevSecOps must introduce tools that securely store and manage secrets and enforce access controls without disrupting automated DevOps workflows.” –Gartner Q: What Problem Does Britive Cloud Secrets Manager Solve? A: Secrets sprawl. Secrets Sprawl /see-krits sprawl/
How Zero Standing Permissions Clear the Way for Zero Trust
Using Zero Standing Permissions to Achieve a Zero Trust Model There is a reason the security community is embracing the zero trust (ZT) principle with renewed energy – because it helps prevent breaches by eliminating implicit trust from a system’s architecture. Instead of automatically trusting users inside a network, ZT dictates that every access point
Cloud IAM: Using Privilege Right Sizing to Contain Privilege Sprawl
Advancing Cloud IAM The following article was published in betanews. Historically identity and access management has been built around an on-premises model. But with more systems now residing in the cloud the old way of doing things isn’t working. To find out more about why the cloud needs a new approach to IAM we spoke
How to Offboard Cloud Users Securely
This article originally appeared in Security Boulevard. Offboard Cloud Users Securely One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, the failure of so many organizations to revoke standing access privileges to
Cyber Burnout: How to Build Cybersecurity Teams that Are Focused, Optimistic, and Satisfied
The following article originally appeared in eWeek. Cyber Burnout Cloud security professionals are already in short supply. Combine that with alert fatigue, a surge in demand, and the “always-on” nature of the modern workplace, and it is clear why employee burnout is increasing. In 2019, Gartner projected that the cloud market would grow to $355B
Avoid These Common Multi-Cloud Privilege Access Management Mistakes
Britive originally published the following article in Security Magazine. Multi-Cloud Privilege Access Management Organizations are moving to multi-cloud environments in droves, largely because the cloud is fast, agile and powerful. But is it secure? Inherently — no. Just like on-prem, multi-cloud environments have significant security risks that must be addressed if your goal is to
Ubiquiti Security Breach: How Zero Standing Privileges Stop Rogue Developers
The Ubiquiti Security Breach Last year, Ubiquiti disclosed a security breach involving their AWS and GitHub accounts. During the breach, the attacker accessed AWS via a privileged user account, moved across the company’s cloud environment, and proceeded to clone gigabytes of data repositories from GitHub. Ubiquiti’s disclosure gained massive attention when a so-called whistleblower claimed
in the media
AI-TechPark Interview with CEO, Britive – Art Poghosyan
Art Poghosyan from Britive Talks with AI-TechPark about the changing Information & Data Security Landscape &
Britive Welcomes Three Experts In Cloud Security, Data Analytics And Sales To Leadership Team
Experts join Britive leadership team As part of an ongoing effort to add proven technology
Britive Raises $10M To Secure Privileged Access For Multi-Cloud Enterprises
Financing round led by Crosslink Capital underscores need for organizations to secure growing cloud-native technology