Join us on May 26th to learn from Gal Diskin and Twitter's CISO Rinki Sethi about the CISO’s role in the upcoming decade.

Authomize Blog

6 Top Emerging IAM Security Risks

As security breaches become a bigger reality, it is crucial that cloud protectors consider the importance of safeguarding their information and strengthening their Identity and Access Management, all while recognizing the top security risks that have risen to the surface

01/02/2021 • Sandra Marcushamer

Read more

The Emergence of Cloud Infrastructure Entitlement Management (CIEM)

By automating authorization management, Authomize is not only able to offer a unique CIEM solution, but it also helps organizations achieve holistic security posture where IaaS security…

12/01/2021 • Gabriel Oliveira

Read more

Lessons Learned for the Next SolarWinds Attack

Nothing is ever truly unhackable. Saying otherwise is asking for trouble. The question is when a breach occurs, how do we plan for our systems to fail gracefully increase our…

30/12/2020 • Gal Diskin and Or Farkash

Read more

Reassessing How to Protect Our Crown Jewels in the Cloud

This has been a year that calls for breaking with complacency and taking steps to define and protect the assets that are most critical to our organizations To say that 2020 has been a year of change would…

10/11/2020 • Dotan Bar Noy

Read more

Download
Solution Brief

Learn how Authomize's solution is changing the way companies are managing authorizations

Download