Identity and Access

Credentialing users so only those allowed can access data and systems.

Start Here: Identity and Access Management (IAM)

Identity and access management (IAM) ensures that only those with the correct digital identification are able to access systems and […]

User Auditing with GAA

If you read the story about Samsung exposing SmartThings and AWS keys in code, which I came across through a […]

Impersonation Failures

Several times in the last few weeks we have looked at applications that have significant issues with “impersonation” features.  What […]

Popular Posts

Ready to get started?

Build a comprehensive security program using our proven model.
© 2012-2024 Jemurai. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram