<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
Maile McCarthy

Maile McCarthy

Contributing Writer and Illustrator, has a passion for helping people bring their ideas to life through web and book illustration, writing, and animation. In recent years, her work has focused on researching the context and differentiation of technical products and relaying that understanding through appealing and vibrant language and images. She holds a B.A. in Philosophy from the University of California, Berkeley. To contact Maile, visit her on LinkedIn.

StrongDM has been featured in Forbes, The New Stack, VentureBeat, DevOps.com, TechCrunch, and Fortune.

Expertise

, , , , , , ,

Education

University of Rochester, UC Berkeley

Degrees & Credentials

BA Philosophy


Latest blog posts from Maile

5 Database Management Challenges to Know in 2024
5 Database Management Challenges to Know in 2024
Apart from its business functions, a database’s core functions are integrating, separating, controlling, accessing, and protecting data. As such, organizations adopting databases must prioritize optimizing data access and protection.
Meet strongDM | Brad Schaider
Meet strongDM | Brad Schaider
Meet Brad, IT Manager at strongDM whose early career included technical and artistic work on blockbuster movie trailers for Disney, Marvel, and more.
Cloud-Native Data Protection Panel Recap
Cloud-Native Data Protection Panel Recap
Cloud environments present new challenges for data protection as technological innovation, flexibility, and abstraction change the way we copy, store, and handle data. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard and a panel of technology experts. ...
Meet strongDM | Abdul Siddiqui
Meet strongDM | Abdul Siddiqui
Abdul Siddiqui, Customer Success Manager at strongDM, tells us about a trip to Pakistan and the door-opening power of judicious quiet.
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs. DAC
This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Tech Marketer By Day, Song Bird By Night
Tech Marketer By Day, Song Bird By Night
Marketing Coordinator Meghan Stephan is a classically-trained singer whose performance venues have ranged from intimate church weddings to professional football games. In today’s interview, she shares her early forays into music, her experience auditioning for The Voice, and an unexpected link between singing and her marketing career.
Meet strongDM | Sienna Gordon
Meet strongDM | Sienna Gordon
Sienna Gordon spent a year solo traveling the world. With a tight budget and a big sense of adventure, she slept in monasteries, zipped through tea fields, and even helped MedEvac someone to safety! Her big takeaway from the experience? There are a lot of nice people in the world. I think it’s fair to say that Sienna is one of them.
Meet strongDM | Phil Hassey, Technical Lead
Meet strongDM | Phil Hassey, Technical Lead
Phil is the technical lead at strongDM. Prior to this, he was an indie game developer working on the multi-player game Galcon. This gave him a lot of experience in low-level network protocols and cross-network synchronization, as well as security. But as we’ll see, Phil’s interests extend well beyond the tech world.
Principle of Least Privilege Explained (How to Implement It)
Principle of Least Privilege Explained (How to Implement It)
Today we’re going to take a closer look at the principle of least privilege (PoLP)—what it is, why it matters, and how to implement it in your organization. Understanding the principle of least privilege is critical, as network administrators must strike a balance between ease and security—protecting network access without causing friction for users. If access is too restrictive, employees won’t be able to do their jobs. Too lax, and the door to attack is open.
SRE vs. DevOps: Understanding the Difference
SRE vs. DevOps: Understanding the Difference
DevOps is a combination of “development” and “operations” and is a set of practices that combine these two disciplines. SRE stands for Site Reliability Engineering and is a principle that applies software engineering practices to infrastructure and operations to improve site reliability. This new IT discipline is evolving, so its differentiation from DevOps isn’t always clear. The information we share here will help you better grasp these two roles and where they intersect. After reading this
What Is Credential Management? 8 Best Practices to Know
What Is Credential Management? 8 Best Practices to Know
Concerned that bad actors could gain access to your digital resources using stolen credentials? Don't worry, there’s a way to safeguard your employees’ account details. Modern credential management tools and policies can give you precise control over who can view keys to access your systems and how much access they may have. The information in this article will help you conquer your biggest credential management challenges. With the right knowledge and tools, you can significantly mitigate the
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.