by Chase Christy | Aug 15, 2025 | Guest blogs
This article was originally written by Cloudanix Introduction The way we manage access in AWS has changed IAM dramatically. When many organizations first ventured into the cloud, creating individual AWS IAM users directly within each account was standard practice....
by Chase Christy | Aug 1, 2025 | The Effective IAM Newsletter
NCC Group’s AI Red Team recently published key findings after penetration testing dozens of AI applications. Analyzing Secure AI Architectures reveals that major AI vulnerabilities stem not from model flaws, but from misunderstanding how AI systems interact with...
by Chase Christy | Jul 19, 2025 | The Effective IAM Newsletter
Welcome to The Effective IAM Newsletter! Our mission is simple: curate high-impact resources that address real-world cloud IAM challenges for busy security professionals. Each edition features an industry trend, expert insight, or practical tool that you can use. You...
by Stephen Kuenzli | Sep 12, 2024 | Security
Some organizations require that all outbound application traffic run through an HTTP proxy so that traffic can be inspected and limited to certain allowlisted domains. But how do you test your application to verify your client libraries have all been configured to use...
by Stephen Kuenzli | Feb 21, 2024 | Announcements, Security
Spreadsheets take a lot of flack but they’re often the right tool for the job. When the job is starting to clean up that ‘dirty kitchen sink’ AWS account or ad-hoc IAM permission analysis, a spreadsheet is often the right tool. Now that analysis is...
Recent Comments