Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 Tips for Kubernetes Role-Based Access Control (RBAC)

The weakest link in your infrastructure might just be your permissions. In Kubernetes, permissions exist to protect your cluster, but if you’re not careful, they can become your number one problem. How? A single misconfigured access role in a Kubernetes cluster can open the door to a full-scale security breach. Yes, your network policies and firewalls are in place, but when a bad actor can kubectl delete a namespace from inside your cluster, the real breach point is access control.

How the One Identity Fabric increases security for complex IT

When you unify a complex technology landscape that consists of diverse deployments—including on-premises, legacy systems, multi-cloud and hybrid environments—you inevitably create a tangled web of identities, each with its own set of security challenges. Identity and access management (IAM) as we know it struggles to keep up. It becomes increasingly complex to manage user access across disparate systems, to maintain consistent security policies and to meet compliance regulations.

Don't fall for it: Five authentication assumptions that can put your company at risk

Myths have always floated through the cybersecurity sphere, and if you don’t address them, they can invite risk to your organization. Join solution engineers Solenne Le Guernic and Grant Tackett to dispel common authentication assumptions that act as landing lights to cybercriminals. Explore the ways OneLogin can mitigate risk, promote productivity and ensure secure, flexible security for all users – no matter the device, the user or the value of the accessed asset.

The enigma of Entra ID security and management - and how Active Roles can help

Active Directory (AD) officially reaches its quarter-century this year, after its late-1990s preview and full release with Windows Server 2000. That’s over 25 years of providing administrators with tools to manage permissions, endpoints and access for network-based resources and objects. In that time, it’s grown to become the choice of around 90% of the Global Fortune 1000s.

What is attestation and why is it important?

Managing an enterprise-level Active Directory (AD) means enterprise-grade volumes of identity accounts. Naturally, operations at this scale come with high complexity and call for intensive resources to maintain control. Manual errors can creep in as the business expands, leading to increased cybersecurity risks and vulnerabilities.

AI in IAM: Automate the monotonous tasks, not the vital ones

Lately, the common theme in emerging identity security technology is AI. It’s all anyone wants to talk about. All of us in the IAM business have been scurrying to find a way to tell our customers and the market that, yes! We have AI! We've had it all along! If that were so obviously true, why isn’t it more broadly known? As an identity security technologist, I’ve experienced the growing pains of AI in IAM. I recently read an interesting essay by a science fiction author.