RESOURCES
Welcome to Britive's knowledge base
Upcoming
Gartner Identity & Access Management Summit
December 9-11, 2024
Gaylord Texan Resort & Convention Center - Grapevine, TX
Upcoming
On-Demand Webinar: A Day in the Life of Cloud Teams Navigating Multiple Identities, Logins, and Roles—An Audit Nightmare
Access On-Demand Recording via Form Fill
Past
AWS re:Invent 2023
November 27 - December 1, 2023
Las Vegas, NV
Past
Access Control in the Cloud: Choosing the Right System for Your Business
Past Event
Past
Britive Co-Founders Invited as Opening Keynote Speakers for Intel’s Software Professionals Conference
Past Event
Past
Britive DevSec Cloudcast
Past Event
Past
Britive is an Identiverse Sponsor
Past Event
Past
DevOpsDays Chicago
Past Event
Past
DevOpsDays Dallas
Past Event
Past
Elevating Secrets Governance in the Cloud
Past Event
Past
Extending Zero Trust to Your Cloud Identity Lifecycle
Past Event
←
October 2024
→
SUN
MON
TUE
WED
THU
FRI
SAT
29
30
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
Access Granted
In a world dominated by growing cloud technology and the unique, identity-based threats that come with it, security teams need consistent and modern defense strategies.
Access Granted is your gateway to understanding and implementing proactive cyber prevention measures and keeping up with transformative strategies and solutions for access management.
Listen on spotify
Introducing: Access Granted
Welcome to Access Granted!
This podcast is designed to bring you transformative strategies and solutions for secure access management in the modern cloud era.
Whether you're new to working on and securing a cloud environment, or you're a seasoned pro with a variety of environment configurations under your belt, this podcast will bring you tips and insight from practitioners across the industry.
Ready to rethink and modernize cloud security?
Read More
The Cyber Risks of Credential Misuse, Static Access, and Over-Provisioning
This episode features John Morton, Field CTO and Cyber Defense Specialist at Britive.
The conversation focuses on the shift from traditional data center architectures to a cloud-based, distributed architecture, it only makes sense for PAM technologies to do the same. This episode also touches on:
- The importance of separating authentication from authorization.
- Understanding security basics and how they apply to identity and access management.
- Why adopting zero standing privileges is critical to reducing the risk landscape and achieving zero trust.
Read More