<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Achieve Zero Trust in AWS đź”’ Join our hands-on workshop on February 27!

Search
Close icon
Search bar icon
strongDM logo

blog

The HIPAA Minimum Necessary Standard Explained

The HIPAA Minimum Necessary Standard Explained

This article gives you a broad look at the Health Insurance Portability and Accountability Act (HIPAA) minimum necessary standard. You’ll learn about
What Is a HIPAA Violation? 12 Most Common Examples

What Is a HIPAA Violation? 12 Most Common Examples

This article digs into Health Care Accountability and Portability Act (HIPAA) violations. Discover what they are and get examples of typical HIPAA
11 Surprising Statistics on Remote Work for 2025
11 Surprising Statistics on Remote Work for 2025
In 2020, the world came to a halt. We suddenly realized that many of the jobs we normally do in the office could be done just as efficiently (if not more) from the comfort of our homes. Two years later, how is remote work faring? Has the enthusiasm for remote work tapered off just like the pandemic? Let’s find out in this list of the latest statistics on remote work.
Cloud Infrastructure Security: Meaning, Best Practices & More
Cloud Infrastructure Security: Meaning, Best Practices & More
In this article, we will broadly examine ‌cloud infrastructure security and explain how a strong cloud security posture benefits organizations. You’ll learn what the top three most costly cloud infrastructure security mistakes are and how to avoid them. By the end of this article, you’ll have a clearer understanding of how cloud infrastructure security works, why it is important, and how to secure cloud infrastructure in order to protect critical IT assets, sensitive data, and intellectual
HIPAA Violation Penalties and Fines by Tiers (Civil & Criminal)
HIPAA Violation Penalties and Fines by Tiers (Civil & Criminal)
This article breaks down the different HIPAA penalties—including civil and criminal penalties—and the maximum penalties for HIPAA violations. Find out who is liable under HIPAA, what the most common HIPAA violations are, and how to ensure compliance and prevent HIPAA violations in your own organization.
Kubernetes Governance Webinar Recap
Kubernetes Governance Webinar Recap
Is k8s governance a challenge for your team? Join strongDM’s CTO and a panel of experts to discover common pitfalls, plus tools + tricks to help manage them.
NIST vs. ISO: Understanding the Difference
NIST vs. ISO: Understanding the Difference
As a business, you need to have benchmarks to work against in all facets of your work. That's especially true when it comes to cybersecurity. In this area, there are two main groups that offer guidelines: The National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO). What's the difference between the two, and which one should you follow? Here's what you need to know.
What is Just-in-Time Access (JIT)? Benefits, Types & More
What is Just-in-Time Access (JIT)? Benefits, Types & More
Today, we’ll take a look at what just-in-time access (JIT) means and what types there are. You’ll also learn about what a JIT access solution can do for your organization. By the end of this article, you’ll understand how just-in-time access works, the best practices to ensure secured implementation, and how strongDM comes to the rescue.
ISO 27001 Audit: Everything You Need to Know
ISO 27001 Audit: Everything You Need to Know
In this article, we’ll cover everything you need to know about conducting ISO/IEC 27001 audits to receive and maintain your ISO 27001 certification. You’ll learn about ISO 27001 audit requirements, why an ISO 27001 audit is important, how long it takes to conduct audits, and who can conduct audits that prove your company follows up-to-date information security management best practices.
11 Common Authentication Vulnerabilities You Need to Know
11 Common Authentication Vulnerabilities You Need to Know
In this article, we’ll take a look at what authentication vulnerabilities are, how they emerge, and how these issues can affect your organization. Also, you’ll learn about the most common authentication-based vulnerabilities and their implications. By the end of this article, you’ll know the best practices to prevent these authentication issues and keep sensitive data safe.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€