The Cost of Ignorance -- Why You Need a Chain of Evidence not just logs

Posted by Michael Bissell on Sep 10, 2018 11:23:44 AM

You may have seen my posting on East/West is the New North/South.  The bottom line is that traditional API Gateway models simply don’t provide the level of security we need in modern microservice architecture.  The problem is that only 20% of the traffic (that is the inbound traffic up until the gateway) is secure, everything inside the data center is “trusted.”

Read More

Topics: Identity, IAM, devops, security

Infrastructure, Legal and EMBARRASSMENT -- Why we Secure Our Systems

Posted by Michael Bissell on Aug 9, 2018 5:37:06 PM

In computer technology we talk about security breaches and how to prevent them, but honestly, we have different kinds of breaches and different reasons to want to prevent them. Sure we hear the stats like “60% of small companies that suffer a cyber-attack are out of business within six months” but what is it about those attacks that cripple and destroy companies? And how can we create better security policies and implement those policies so we don't suffer attacks?

Read More

Topics: Identity, IAM, devops, security

Cloudentity Benefits (In 1min 15sec)

Posted by Michael Bissell on Jul 28, 2018 9:47:27 PM

The Cloudentity stack is very powerful and very flexible, which means it's hard to tell the story from one person's point of view.  This short (1:15) video gives a quick view from four different people's perspectives.

Read More

Topics: Identity, IAM, devops

East/West is the new North/South

Posted by Michael Bissell on Jul 19, 2018 9:45:33 AM

We talk about network traffic in two ways – North/South traffic is the traffic heading in and out of your network. East/West traffic is the traffic from one server to another inside your network.  So why do we focus so much on North/South and almost forget about East/West?

As I mentioned in Identity and Security Starts at Home, the era of Zero Trust means we can’t trust traffic coming from inside the house.  Internal systems can be compromised and if your internal security is just IP whitelisting or trusted certs, a “trusted app” can do a lot of damage by probing the internal network.

Read More

Topics: Identity, IAM, devops

Defense In-Depth for API and DevOps Security

Posted by Nathanael Coffing on Jul 10, 2018 6:43:55 PM

 Authorization has come along way since setting bits in the file system. With the advancements in Machine learning, big data and behavioral profiling its time for authorization to take its next generational leap and move into a flexible risk based access control model that works in concert with legacy access control policies.

Read More

Topics: Identity, IAM, devops

Developer Self Service for Identity and API Security.

Cloudentity provides enterprise application developers with a suite of microservices that seamlessly integrates Identity and API Security. Accelerate the DevOps processes with a service mesh that reduces time to market and development cost by 30%.

Download the whitepaper

 

Try the Cloudentity API Security Trial

Or refer it to an Enterprise Developer in your company.

TRY FOR FREE

 

Subscribe Here!

Recent Posts