<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
What is an Attack Surface? (And the Best Way to Reduce It)

What is an Attack Surface? (And the Best Way to Reduce It)

Data breaches are a perpetual risk for modern organizations — and the wider your attack surface, the higher your organization’s risk of a breach. In this article, we will take a high-level look at what your attack surface is, what vectors and endpoints may be at risk, and how to analyze your attack surface.
What Is Data Loss Prevention? Best Practices

What Is Data Loss Prevention? Best Practices

Data loss prevention (DLP) can save organizations millions of dollars on data breaches every year. In this article, we will take a big-picture look at data loss prevention and discover how DLP tools and processes strengthen an enterprise’s security posture.
What is SD-WAN? Everything You Need to Know

What is SD-WAN? Everything You Need to Know

In this article, we’ll review what SD-WAN is, its history and development, as well as the key benefits and limitations of SD-WAN deployment. You’ll learn the difference between SD-WAN and WAN, VPNs, MPLS, and SDN and how the different services and solutions compare.
Understanding Cloud Access Security Brokers (CASBs)

Understanding Cloud Access Security Brokers (CASBs)

In this article, we’ll take a high-level look at what a CASB is, what it does, and how it works. You’ll learn the key pillars of CASBs and how they address the growing threat of Shadow IT in cloud-based organizations. By the end of this article, you’ll understand the differences between CASB, SASE, and IAM, as well as the main challenges to implementing a CASB solution.
What Is Lateral Movement? (And How to Detect & Prevent It)

What Is Lateral Movement? (And How to Detect & Prevent It)

Lateral movement is when an attacker gains initial access to one part of a network and then attempts to move deeper into the rest of the network — typically via remote desktop tools or remote administration tools (RATs).
You Can't Have Zero Trust Without Identity and Access Management

You Can't Have Zero Trust Without Identity and Access Management

In a recent podcast, Gartner described the starting point for Zero Trust: Identity and Access.
7 Network Segmentation Best Practices to Level-up Your Security

7 Network Segmentation Best Practices to Level-up Your Security

Network segmentation is key to a modern security posture. Boost your network security and improve performance with these network segmentation tips.
Being Better: Solving Today’s Infrastructure Security Challenges with Better’s CISO

Being Better: Solving Today’s Infrastructure Security Challenges with Better’s CISO

Modern infrastructure challenges range from new regulations to secrets management. See how Better’s CISO is tackling these challenges.
4 Things You Can Start Today to Improve Your API Security

4 Things You Can Start Today to Improve Your API Security

Surging API use presents new challenges for application security. Discover how experts from StackHawk, strongDM & imVision are learning to adapt and improve their API security.
Embracing the New Mindset of Cloud-Native Security

Embracing the New Mindset of Cloud-Native Security

What is a “mindset of cloud-native security”? 🤔 That’s a great question. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard at Container Journal and a panel of technology experts to discuss just that—and how to implement it without creating friction.
Scaling Your SSH Strategy

Scaling Your SSH Strategy

In our last post, we discussed some of the challenges that are inherent to management of SSH keys across your infrastructure as you scale the number of team members and servers. In this post, we will dig into some of your options and the trade-offs that they provide.
How We Automate User Provisioning & Keep Track of Credentials

How We Automate User Provisioning & Keep Track of Credentials

There are a number of ways to automate user provisioning but the real challenge lies in keeping track of those credentials.
SSH Key Management Explained: Best Practices & More

SSH Key Management Explained: Best Practices & More

Infrastructure and DevOps administrators face significant barriers in managing Secure Shell (SSH) keys. In this article, we’ll explore the complexities of SSH key management. We’ll also show how to effectively authenticate users without having to manage SSH keys for individual users.
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it doesn’t provide us with a single, built-in method for authenticating those accounts. Instead, we must choose from a variety of techniques involving third-party tools or resources to perform Kubernetes cluster authentication.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀