RESOURCES
Welcome to Britive's knowledge base
[ Blog ]
2022 Cybersecurity Excellence Awards Britive Gold Medal for Cloud Privilege Access Management
[ Blog ]
3 Frictionless Strategies to Boost Your GCP IAM
[ Blog ]
3 Steps Software Engineering Leaders Can Follow to Reduce Security Risks to Supply Chains
[ Blog ]
4 Advantages of Just-in-Time Privileged Access Management (JIT PAM)
[ Blog ]
4 Key Takeaways from the New Gartner Report: Innovation Insight for Cloud Infrastructure Entitlement Management
[ Blog ]
5 Reasons Why Just-in-Time Cloud Access is Pioneering the Future of CIEM
[ Blog ]
5 Simple Ways Innovative Tech Decision-Makers Can Streamline DevOps Security
[ Blog ]
6 Foundational Pillars of a Modern Cloud Privileged Access Management Strategy
[ Blog ]
A Big Day
←
December 2024
→
SUN
MON
TUE
WED
THU
FRI
SAT
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
4
Access Granted
In a world dominated by growing cloud technology and the unique, identity-based threats that come with it, security teams need consistent and modern defense strategies.
Access Granted is your gateway to understanding and implementing proactive cyber prevention measures and keeping up with transformative strategies and solutions for access management.
SUBSCRIBESUBSCRIBE
Ep 1: The Cyber Risks of Credential Misuse, Static Access, and Over-Provisioning
This episode features John Morton, Field CTO and Cyber Defense Specialist at Britive.
The conversation focuses on the shift from traditional data center architectures to a cloud-based, distributed architecture, it only makes sense for PAM technologies to do the same. This episode also touches on:
- The importance of separating authentication from authorization.
- Understanding security basics and how they apply to identity and access management.
- Why adopting zero standing privileges is critical to reducing the risk landscape and achieving zero trust.
Watch the episode on YouTube
Read More
Ep 2: Identity & Access Management in Life Sciences: Strategies for a Secure Cloud Journey
Join Nauman Mustafa, John Morton, and Roy Long in a discussion on the evolving identity and access security landscape with a focus in the life sciences industry. They explore the impact of COVID-19 on cloud adoption, the shift from traditional security measures to a greater focus on identity management, and the importance of implementing a zero-trust architecture.
Listen in for insights on the role AI will play in enhancing security and operational efficiency, the challenges of effective change management, and key lessons learned from recent cyber attacks.
Key episode takeaways include:
- The struggles of keeping up with cloud adoption
- How and why identity and access management is critical in breach prevention
- The importance of understanding a security posture for the sake of improvement
Learn more about Britive's Cloud PAM
Learn more about skyPuprle Cloud
Watch the video episode on YouTube
Read More
Ep 3: Identity as the New Perimeter: Protect Identity, Protect Everything
In this episode, Thomas Rawley, Head of US Engineering at Britive, delves into the real-world challenges enterprises face as they transition from on-premise to multi-cloud environments.
The conversation goes over the growing importance of identity as the new security perimeter, the critical need to decouple authentication from authorization, and how to build a resilient cloud architecture.
Key takeaways include:
- Best practices for securing cloud access
- Why Just-in-Time (JIT) access matters
- How to ensure your multi-cloud strategy stays agile, secure, and scalable
Learn more about Britive's Modern Cloud PAM Platform
Read More
Ep 4: Zero Trust Access Strategies for Startups and Cloud-Native Enterprises
Explore Britive’s Cloud-native PAM platform: https://www.britive.com/
In this episode of Access Granted, Nauman Mustafa sits down with Harry Wan, Britive’s Head of Product and Information Security. The discussion delves into the modern challenges and strategies of securing identity and access management (IAM) in cloud-native environments, from startups to enterprises.
Join in on an engaging discussion with insights, strategies, and trends around protecting data while enabling agile, secure cloud operations.
Key topics include:
- The rise of cloud-native security, prompted by the adoption of microservices, and cloud-hosted applications changing traditional security approaches.
- Eliminating static, long-lived access with ephemeral credentials to limit the potential attack surface.
- The benefits of a streamlined, centralized approach to access management to facilitate audits and compliance.
- Advice for balancing speed and security, especially for startups early in their journey.
- A look ahead at the future of AI in identity security, especially around anomaly detection.
📺 Watch this episode on YouTube: https://www.youtube.com/playlist?list=PLotHzn4KKa4K7qanA_Oi2-LZagw_mINyA
Read More
Ep 5: Modernizing Identity and Access Management Frameworks in the Cloud
Explore Britive’s Cloud-native PAM platform: https://www.britive.com/
In this episode of Access Granted, Nauman Mustafa discusses the task of modernizing identity and access frameworks in the cloud with Palak Chheda, an experienced practitioner in IAM. They shed light on the growing importance of identity as a foundational part of cybersecurity.
Key discussion topics include:
How cloud-native PAM solutions are shifting from static permissions to short-lived privileges to reduce risk.
Key considerations when selecting a PAM solution in a modern cloud-first environment.
The growing need for identity management across multiple cloud and SaaS environments.
The emerging role of AI and IAM, especially in right-sizing permissions.
Encouraging the partnership between IAM, cloud, and security teams.
📺 Watch this episode on YouTube: https://www.youtube.com/playlist?list=PLotHzn4KKa4K7qanA_Oi2-LZagw_mINyA
Read More
Ep 6: Non-Human Identities - The Silent Risk in Cloud Security
Explore Britive’s Multi-Cloud PAM platform: https://www.britive.com/
In this episode of Access Granted, Nauman Mustafa dives into the critical, and often overlooked topic of securing non-human identities (NHIs) in cloud environments. Lalit Choda, founder of the Non-Human Identity Management Group, joins in the conversation to explore how and why they’ve become a significant security risk and what organizations can do to address them.
Key discussion topics include:
- What’s considered an NHI? Examples include API keys, service accounts, automations, and more.
- How static credentials, secrets sprawl, and stale accounts create vulnerabilities and increase the attack surface.
- Practical steps for organizations, including scanning repos for hard-coded credentials, cycling tokens, and creating a full NHI inventory.
- The importance of Zero Standing Privileges (ZSP) and just-in-time (JIT) access to securing NHIs without impeding developer agility.
- The intersection of AI, NHIs, and security – and balancing innovation with robust protection
👥: Visit the Non-Human Identity Management Group: https://www.linkedin.com/groups/13038250/
🎧 Listen to Access Granted on Spotify: https://open.spotify.com/show/7ukJOqUhDmTRj2pm3ykibS
Read More
Ep 7: Unlearning to Innovate and Solve Problems
In this episode of Access Granted, we sit down with Sameer Hiremath, Co-Founder and Head of Engineering at Britive, to explore the evolution of cloud-native privileged access management (CPAM). Sameer shares his insights on building innovative security solutions for modern enterprises, the challenges of managing static access and over-privileged identities, and how embracing cloud-native architectures can revolutionize your security strategy.
Key Episode Highlights:
- The importance of moving beyond traditional on-prem solutions and embracing architectures that leverage full cloud potential.
- How Zero Standing Privileges (ZSP) can mitigate risk from static, over-provisioned credentials and accounts.
- How integrating seamlessly with existing tools like CLI and CI/CD pipelines can reduce friction and improve adoption.
- The future of using AI and anomaly detection in proactive risk identification and mitigation.
- The importance of solving pain points and thinking beyond legacy approaches when building solutions that scale with enterprise needs.
📺 Watch this episode on YouTube: https://www.youtube.com/playlist?list=PLotHzn4KKa4K7qanA_Oi2-LZagw_mINyA
🌩️ Learn more about Britive's Multi-Cloud PAM platform: https://www.britive.com/
Read More
Introducing: Access Granted
Welcome to Access Granted!
This podcast is designed to bring you transformative strategies and solutions for secure access management in the modern cloud era.
Whether you're new to working on and securing a cloud environment, or you're a seasoned pro with a variety of environment configurations under your belt, this podcast will bring you tips and insight from practitioners across the industry.
Ready to rethink and modernize cloud security?
Read More