Stack Identity
  • Platform
  • Solution
    • Identity Hygiene Risk Assessment
    • Database Access Governance
    • Securing NHI
    • Next Gen Risk based IGA
    • Just in Time Access
    • Zero standing Privileges
    • Infrastructure Access Control
    • Compliance
  • Partners & Integrations
  • Resources
    • Blogs
    • Case Studies
    • White Papers
    • Demos
  • Company
    • About Us
    • Join Us
    • Leadership
    • Newsroom
    • Office Hours
  • Contact
Select Page
Stack Identity Shadow Access Impact Report: How Identity and Access are Disrupting Cloud Security, Compliance and Governance

Stack Identity Shadow Access Impact Report: How Identity and Access are Disrupting Cloud Security, Compliance and Governance

Aug 8, 2023 | Blogs

Summary: This Stack Identity Shadow Access Report outlines the risks created by thousands of dynamically changing cloud identities and associated access permissions. It provides key statistics and insights on how the security of cloud environments are at risk of the...
Navigating the SOC-2 Process: A Start-Up’s Experience wrt Governance, Administration and Audit

Navigating the SOC-2 Process: A Start-Up’s Experience wrt Governance, Administration and Audit

May 30, 2023 | Blogs

We are in the business of identity and access governance for cloud native applications and have built a SaaS platform to offer our solution. We understand the importance of security and wanted to start with SOC-2 compliance to implement basic security for our...
Stack Identity and AWS partner for continuous monitoring and remediation of Shadow Access in public and data cloud environments

Stack Identity and AWS partner for continuous monitoring and remediation of Shadow Access in public and data cloud environments

May 17, 2023 | Blogs

Stack Identity has achieved Validated Partner status and passed the AWS Foundational Technical Review for its automated cloud IAM operations platform. The Stack Identity platform detects the dynamically changing yet recurring risk of data exfiltration, and helps...
LastPass Breach Investigation: An Analysis Through the Lens of Cloud IAM Operations

LastPass Breach Investigation: An Analysis Through the Lens of Cloud IAM Operations

Apr 25, 2023 | Blogs

By Venkat Raghavan and Dr.Prakash Shetty This report is an analysis of IAM activities undertaken by the threat actor in the LastPass breach; the source of this analysis is the publicly reported incident timeline from LastPass. Introduction to the Analysis of the...
How PagerDuty and Stack Identity Ensure Timely Notification of Cloud Data Breach Risks

How PagerDuty and Stack Identity Ensure Timely Notification of Cloud Data Breach Risks

Apr 25, 2023 | Blogs

By Stuart Horne Security teams complain that they are overwhelmed with existing cyber security initiatives when it comes to dealing with emerging new attack vectors. Yet one of the newest attack vectors – Shadow Access (resulting from poorly managed IAM...
How To Secure Your Data Supply Chain with an Identity-First Approach

How To Secure Your Data Supply Chain with an Identity-First Approach

Mar 28, 2023 | Blogs

Digital supply chains and data power our digital economy. Conceptually similar to physical supply chains, digital supply chains interconnect various data systems, data providers and data consumers. Many financial services and banking customers need to share sensitive...
« Older Entries
Next Entries »
Stack Identity
Stack Identity helps cloud security teams eliminate Shadow Access by revealing identity and access blindspots.
Contact Us:
info@stackidentity.com
1600 El Camino Real Suite 280, Menlo Park, CA 94025

Product and use cases

Compliance
CAPM
For CISOs
For Cloud Leaders

COMPANY

Home
About Us
Contact Us
Join Us
© StackIdentity Terms Privacy Policy Security Policy