The Privileged Access Blog
The Migus Group’s blog covering identity and access management, PAM, DevSecOps, IT operations and other topics related to enterprise security.
Securely authenticate to the AWS CLI with vaulted Access Keys — December 6, 2023
Vaulting your AWS Access Keys is a crucial security measure to protect your cloud resources and workloads. This tutorial explores the steps needed to securely store AWS credentials in Keeper’s zero-knowledge vault and configure the AWS CLI to authenticate using Keeper’s open-source credential process integration.
Service Account Protection: Critical Strategic Cybersecurity — November 6, 2023
Service accounts are the silent workhorses of the IT environment. From executing automated services to managing virtual machine instances, these specialized accounts are integral to the smooth running of crucial business applications. However, their importance in cybersecurity is disproportionately overlooked.
Sign Git Commits Securely With Vaulted SSH Keys — October 17, 2023
Learn how to use Keeper Security’s Vault to store and sign your git commits with SSH keys and verify them on GitHub.
Top 7 Cybersecurity Terms To Know — May 8, 2023
Cybersecurity has its own language — and you need to know it. Check out these top cybersecurity terms.
What Is a Proactive Cybersecurity Program? — May 2, 2023
Anticipate and reduce threats with a proactive cybersecurity program. Learn how this approach differs from reactive tactics and how to implement it.
Passkey vs Password: What Is a Passkey? — April 18, 2023
Many cyber risks stem from problems with login credentials. Learn about secure alternatives in our passkey vs password comparison.
How To Identify Cyber Risk in Your Company — April 11, 2023
Financial losses from a security event can harm your company. Understanding your cyber risk helps you prioritize actions. Learn how to assess threats.
Understanding Privileged Access Management — April 4, 2023
Privileged access management (PAM) is a high-priority cybersecurity defense strategy. Upgrade and implement your PAM solutions set with your trusted strategic partner.
An Overview of the Cybersecurity Risk Management Process — March 28, 2023
Managing, mitigating and eliminating your cybersecurity risks require a comprehensive process. Conduct your cybersecurity risk assessments and upgrade your state of readiness.
What Is an IAM Assessment and How Does It Work? — March 22, 2023
An IAM assessment is a critical part of maintaining cybersecurity strength organization-wide. Consider scheduling your IAM assessment with a strategic partner today.