Author: Raj Mallempati, COO of CloudKnox Security What is CIEM? Among the many changes of 2020, Gartner added a new category: cloud infrastructure entitlement management (CIEM). While CIEM may sound similar to SIEM (security information and event management), the two security solutions are not the same, and CIEM is increasingly vital as organizations continue to […]
Authors: Raj Mallempati and Mike Raggo The aftermath of the Solarwinds breach and subsequent impact on thousands of organizations has left organizations scrambling to determine the impact. FireEye, Crowdstrike, and others have provided free tools for detection and incident response and forensics. As organizations assess the impact, we at CloudKnox wanted to provide additional guidance […]
CloudKnox Security made the 2020 CRN 10 Hottest Cloud Security Startups list! The list includes some of the sharpest minds in cloud security from Silicon Valley to New York to Israel, and we’re proud to be in such good company.
We recently announced that CloudKnox has extended support for serverless functions on Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP), in addition to a strategic enterprise technology integration with ServiceNow.
When we talk about the origins of common security incidents and breaches, we rarely consider the problem as it relates to privileged identities and their access rights to cloud resources. But if you look back at the most high-profile breaches of the last few years, you will note a direct link to this emerging attack […]
The emerging new attack surface you probably didn’t know you were creating Risk is everywhere, something every CISO and security team knows well. Yet there’s still a gap between our recognition that risk is present, and our ability to eliminate risk. In the world of cloud security, it can be because we fail to understand […]
In the cloud, your security is only as good as your ability to control the level of access your human and non-human identities have to your infrastructure. Since the actions these identities can take are dictated by the types of permissions you grant them, protecting against excessive permissions and quickly responding when those permissions are […]
Every conversation about cloud security with customers and partners leaves me with the same thought: What’s old is new again. This is especially true when it comes to some identity management basics. Consider the tried-and-true AAA framework: Authentication, Authorization and Auditing. In this article published in Dark Reading, I discuss how this framework would work […]
Is your cluttered infrastructure inviting unnecessary risk exposure? There are few things as liberating as a thorough spring cleaning. We notice accumulation of unnecessary “stuff” — clothes we no longer wear, household items we no longer use, furniture we don’t need, and much more. Most of us do nothing about it; in fact, we keep […]
Verizon’s seminal annual analysis of cybersecurity breaches revealed that misconfigurations saw the highest growth year-over-year (4.9%) among all threat actions it analyzed. But as we’ve seen from some of the most high-profile cloud data breaches in the past year, misconfigurations are just the tip of the iceberg. The real damage from most misconfigurations can be […]
Subscribe to the CloudKnox Blog
Sign up to receive notification of new blog posts and insights