<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

We're blowing the whistle on Legacy PAM 🏀 Join us for an Access Madness Webinar on March 28

Search
Close icon
Search bar icon
blog /
Cloud Infrastructure Security: Meaning, Best Practices & More

Cloud Infrastructure Security: Meaning, Best Practices & More

In this article, we will broadly examine ‌cloud infrastructure security and explain how a strong cloud security posture benefits organizations. You’ll learn what the top three most costly cloud infrastructure security mistakes are and how to avoid them. By the end of this article, you’ll have a clearer understanding of how cloud infrastructure security works, why it is important, and how to secure cloud infrastructure in order to protect critical IT assets, sensitive data, and intellectual
Kubernetes in the Enterprise Webinar Recap

Kubernetes in the Enterprise Webinar Recap

Join strongDM CTO Justin McCarthy and a panel of experts as they discuss the challenges, complexities, and best practices of enterprise k8s adoption.
Has Your Technical Debt Become Unsustainable?

Has Your Technical Debt Become Unsustainable?

A closer look at what technical debt is, how it relates to infrastructure access, and why unwinding short-term workarounds can actually improve productivity.
What is Just-in-Time Access (JIT)? Benefits, Types & More

What is Just-in-Time Access (JIT)? Benefits, Types & More

Today, we’ll take a look at what just-in-time access (JIT) means and what types there are. You’ll also learn about what a JIT access solution can do for your organization. By the end of this article, you’ll understand how just-in-time access works, the best practices to ensure secured implementation, and how strongDM comes to the rescue.
11 Common Authentication Vulnerabilities You Need to Know

11 Common Authentication Vulnerabilities You Need to Know

In this article, we’ll take a look at what authentication vulnerabilities are, how they emerge, and how these issues can affect your organization. Also, you’ll learn about the most common authentication-based vulnerabilities and their implications. By the end of this article, you’ll know the best practices to prevent these authentication issues and keep sensitive data safe.
How to Avert Authentication Bypass Vulnerabilities for Self-hosted Web Infrastructure

How to Avert Authentication Bypass Vulnerabilities for Self-hosted Web Infrastructure

When it comes to self-hosting critical web infrastructure, modern security requires more than simply siloing an appliance to a local network. In this article, we will discuss new methods for authentication bypass vulnerabilities, simplify end-user experiences, and satisfy compliance requirements—without the need for legacy VPN solutions. Here’s how.
What is WebAuthn? Web Authentication Explained

What is WebAuthn? Web Authentication Explained

In this article, we will take a deep dive into WebAuthn and some of its associated authentication concepts. We’ll go over the history of WebAuthn and help you better understand the benefits and challenges of using this standard of secure authentication. By the end of this WebAuthn guide, you’ll be able to fully define the concept and grasp how to incorporate it into your organization's security program and web applications.
35 Alarming Small Business Cybersecurity Statistics for 2024

35 Alarming Small Business Cybersecurity Statistics for 2024

Cyberattacks against small businesses have been on the rise in recent years. Despite the attitude among many small business owners that hackers only go after behemoths, smaller companies make increasingly attractive prey. We’ve gathered the most recent cybersecurity statistics relevant to small businesses. Read on to find out exactly what they are up against and what steps they can take to defend themselves.
Cloud-Native Data Protection Panel Recap

Cloud-Native Data Protection Panel Recap

Cloud environments present new challenges for data protection as technological innovation, flexibility, and abstraction change the way we copy, store, and handle data. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard and a panel of technology experts. ...
Managing Access to Ephemeral Infrastructure At Scale

Managing Access to Ephemeral Infrastructure At Scale

Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
Understanding Software-Defined Networking (SDN)

Understanding Software-Defined Networking (SDN)

In this article, we will take a comprehensive look at software-defined networking (SDN). You’ll learn what it is, how it works, and what its benefits and disadvantages are. You’ll also learn how SDN compares to and works with other types of networks and get answers to common questions.
A Beginner’s Guide to Microsegmentation

A Beginner’s Guide to Microsegmentation

In this article, we’ll review the basics of microsegmentation and discuss it in context with other network security models and practices, including Zero Trust, software-defined networking, and network segmentation. You’ll learn about the benefits of microsegmentation, how it works, challenges for implementation, and best practices.
What is an Attack Surface? (And the Best Way to Reduce It)

What is an Attack Surface? (And the Best Way to Reduce It)

Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
Data Loss Prevention Best Practices

Data Loss Prevention Best Practices

Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.