Google Cloud and IAM Product Strategy

IAM is allowing the right users to the right access at the right time. In today’s enterprise there are many ways to manage IAM and moving to the cloud has required additional controls to mitigate risk. An organization may deal with uniformed admins not applying the principle of least privileged. There can even be roles explosion making IAM a nightmare …

Enterprise IAM Assessments

Today’s enterprise has become an array of tools, systems and applications as businesses continue their drive for efficiency, cost cutting, and competitive advantages. In time this has led to a lack of concern for security for many enterprises. The short term it makes sense as revenue is going to keep the business going and growing. The problem with this approach …

Two Factor Security Flaw

A reminder that your security is only as best as the weakest link. A compromise of one system reveals weak points in web services that many believe are secure. Some people utilize two factor authentication for their accounts. (Email and financial services). However, I assume the majority of people use the SMS or call feature to retrieve the second authentication to access their accounts. It …