By Raj Mallempati, COO of CloudKnox Security As organizations modernize IT and adopt hybrid and multi-cloud infrastructures to support more distributed business processes involving human and non-human identities, the traditional security perimeter becomes outdated. Identities today are the new security perimeter and have become an emerging attack vector to exfiltrate business-critical data. In fact, 52% […]
By Nicholas Barretta, Principal Solutions Architect at CloudKnox Many organizations are setting their sights on a Zero Trust strategy for cybersecurity, seeing it as the best way to protect their networks and data in multifaceted, fast-changing, ever-expanding hybrid and multi-cloud environments. To get there, they need a firm grip on all the identities within their […]
By: Raj Mallempati, COO at CloudKnox Security As February comes to a close, love is still in the air for security operators because CloudKnox’s Cloud Infrastructure Entitlement Management (CIEM) solution has solidified a technical partnership with Amazon Web Services (AWS) in the form of an AWS Config integration. Swiping Right on Right-Sizing Permissions The global […]
Author: Raj Mallempati It’s going to take months for companies to get a full grasp of the impact the SolarWinds breach has had on organizations—if ever. As breached organizations continue assessing the effects to their business, there is one thing we know for sure: Fortifying public cloud, multi-cloud and private cloud architectures is critical to […]
Author: Raj Mallempati, COO of CloudKnox Security Kubernetes Containers. You know it, you love it, and now you can get the Cloud Permissions Management you need on top of it! The CloudKnox Permissions Management Platform now provides customers full visibility into container orchestration to enable Zero Trust access. Step 1: Stir in Kubernetes Containers By […]
Author: Raj Mallempati, COO of CloudKnox Whether it is to adapt to remote work, improve innovation, or build agile teams, organizations continue to prioritize digital transformation for myriad reasons. And, while there are many business benefits to digital transformation strategies—from boosted productivity to tools that unlock new functions—there are also significant cloud infrastructure security risks […]
Author: Raj Mallempati, COO of CloudKnox Security What is CIEM? Among the many changes of 2020, Gartner added a new category: cloud infrastructure entitlement management (CIEM). While CIEM may sound similar to SIEM (security information and event management), the two security solutions are not the same, and CIEM is increasingly vital as organizations continue to […]
Authors: Raj Mallempati and Mike Raggo The aftermath of the Solarwinds breach and subsequent impact on thousands of organizations has left organizations scrambling to determine the impact. FireEye, Crowdstrike, and others have provided free tools for detection and incident response and forensics. As organizations assess the impact, we at CloudKnox wanted to provide additional guidance […]
CloudKnox Security made the 2020 CRN 10 Hottest Cloud Security Startups list! The list includes some of the sharpest minds in cloud security from Silicon Valley to New York to Israel, and we’re proud to be in such good company.
We recently announced that CloudKnox has extended support for serverless functions on Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP), in addition to a strategic enterprise technology integration with ServiceNow.
Author: Mora Gozani, Head of Marketing at CloudKnox Security When we talk about the origins of common security incidents and breaches, we rarely consider the problem as it relates to privileged identities and their access rights to cloud resources. But if you look back at the most high-profile breaches of the last few years, you […]
Author: Mora Gozani, Head of Marketing at CloudKnox Security The emerging new attack surface you probably didn’t know you were creating Risk is everywhere, something every CISO and security team knows well. Yet there’s still a gap between our recognition that risk is present, and our ability to eliminate risk. In the world of cloud […]
Author: Mora Gozani, Head of Marketing at CloudKnox Security In the cloud, your security is only as good as your ability to control the level of access your human and non-human identities have to your infrastructure. Since the actions these identities can take are dictated by the types of permissions you grant them, protecting against […]
Author: Raj Mallempati, COO of CloudKnox Security Every conversation about cloud security with customers and partners leaves me with the same thought: What’s old is new again. This is especially true when it comes to some identity management basics. Consider the tried-and-true AAA framework: Authentication, Authorization and Auditing. In this article published in Dark Reading, […]
Author: Mora Gozani, Head of Marketing at CloudKnox Security Is your cluttered infrastructure inviting unnecessary risk exposure? There are few things as liberating as a thorough spring cleaning. We notice accumulation of unnecessary “stuff” — clothes we no longer wear, household items we no longer use, furniture we don’t need, and much more. Most of […]
Author: Raj Mallempati, COO of CloudKnox Verizon’s seminal annual analysis of cybersecurity breaches revealed that misconfigurations saw the highest growth year-over-year (4.9%) among all threat actions it analyzed. But as we’ve seen from some of the most high-profile cloud data breaches in the past year, misconfigurations are just the tip of the iceberg. The real […]
Authors: Mora Gozani and Thuy Nguyen, CloudKnox Security, Inc. If you think you’ve got your bases covered better than Capital One, then you’re clearly not paying attention. Capital One has one of the best cloud security teams in the industry and has already contributed greatly to the security community by releasing open source tools like Cloud […]
When I think of service, I think of raising a flag on my beachside palapa to signal I’m ready for another margarita and having it delivered moments later.
A lot has been written about the Capital One breach that was disclosed on July 19.
Remember when computers were simple — like really simple? I don’t, but my dad used to tell me stories of how in them days
The principle of least privilege is one of the most fundamental and important concepts in security.
Opinions expressed are solely my own and do not express the views or opinions of my employer
Subscribe to the CloudKnox Blog
Sign up to receive notification of new blog posts and insights