Pro Identity Blog

CyberArk Series: Part 2 – Securing Access to AWS Aurora (PostgreSQL) Database using Zero-Standing Privilege (ZSP)

🚀 New Blog Alert: Securing Access to AWS Aurora PostgreSQL with Zero Standing Privilege (ZSP) 🚀 In the second blog of her insightful series, Preeti dives deep into the concept of Zero Standing Privilege (ZSP) and how it can be a game-changer in securing access to your AWS Aurora PostgreSQL databases, with the help of […]

CyberArk Series: Part 2 – Securing Access to AWS Aurora (PostgreSQL) Database using Zero-Standing Privilege (ZSP) Read More »

CyberArk Series: Secure Vaulted Access to AWS Aurora

This blog series explores how to secure access to cloud databases using modern session management to enhance operational efficiency and reduce risks—all without disrupting the experience for admins, developers, or database users.Our first blog focuses on securing vaulted access to AWS Aurora PostgreSQL databases using CyberArk Secure Infrastructure Access. Check out the blog at https://awsaurorapostgresvaultedaccount.hashnode.dev/securing-access-to-aws-aurora-postgresql-database-using-vaulted-credentials

CyberArk Series: Secure Vaulted Access to AWS Aurora Read More »

The Future of Identity and Access Management (IAM) and Privileged Access Management (PAM) in Australia: A Glimpse into 2025

As Australia continues to evolve in the digital age, the role of Identity and Access Management (IAM) and Privileged Access Management (PAM) is more critical than ever before. By 2025, these security practices will be at the heart of organizations’ cybersecurity frameworks, driven by increasing complexity in digital transformation, more sophisticated cyber threats, and a

The Future of Identity and Access Management (IAM) and Privileged Access Management (PAM) in Australia: A Glimpse into 2025 Read More »

Breaking the Air-Gap: A New Threat to Isolated Systems

Reference – RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM – Dr. Mordechai Guri https://arxiv.org/abs/2409.02292 Air-gapped systems, which are physically isolated from external networks like the Internet, are considered secure due to their lack of direct or remote communication capabilities. This isolation is crucial in sensitive environments where data

Breaking the Air-Gap: A New Threat to Isolated Systems Read More »

Best Practices for Implementing Identity and Access Management (IAM)

Introduction Identity and Access Management (IAM) is a critical component of an organization’s security framework. It ensures that the right individuals have access to the right resources at the right times for the right reasons. Implementing IAM effectively can help protect sensitive data, streamline operations, and ensure compliance with regulatory requirements. Here are some best

Best Practices for Implementing Identity and Access Management (IAM) Read More »