🚀 Meet Apono at Black Hat USA 2024! 🚀 If you’re going to BlackHat this year, schedule a meeting with one of our experts to learn how we empower security teams with robust access management, ensuring uncompromising security and seamless productivity. 🔗 Schedule a meeting here: https://lnkd.in/gTikHdfR #CyberSecurity #AccessManagement #Apono #ZeroStandingPrivilege #SecuritySolutions #BlackHatUSA2024
Apono
Software Development
Wilmington, Delaware 4,613 followers
A permission management automation platform providing 'just in time' access to cloud assets, DBs, k8s clusters, & more.
About us
Apono, led by cybersecurity and DevOps experts. “Apono” is the Hawaiian word for “approve”. The Apono platform is loved by DevOps, trusted by Security - supports customers like OpenWeb, Cybereason, HiredScore, Tomorrow.io and many more in automating permission management. Providing a frictionless experience for users with the visibility and compliance needed by security to win more business. Apono helps customers move to zero standing, just in time permissions, get started in minutes at https://www.apono.io
- Website
-
https://www.apono.io
External link for Apono
- Industry
- Software Development
- Company size
- 11-50 employees
- Headquarters
- Wilmington, Delaware
- Type
- Privately Held
- Founded
- 2021
- Specialties
- devops, cybersecurity, and cloud
Products
Locations
-
Primary
Wilmington
Wilmington, Delaware, US
Employees at Apono
Updates
-
We're #hiring a new Commercial Account Executive in New York City Metropolitan Area. Apply today or share this post with your network.
-
We're #hiring a new Field Marketing Manager in New York. Apply today or share this post with your network.
-
We're #hiring a new Vice President Marketing in New York. Apply today or share this post with your network.
-
We're #hiring a new Back End Developer in Tel Aviv-Yafo, Tel Aviv District. Apply today or share this post with your network.
-
A former NCS employee who had unauthorized access to the company’s computer systems deleted 180 virtual servers. The lesson? Granting standing access to sensitive resources is inherently risky, and not revoking access for terminated employees heightens this risk further. Here’s a video on everything you need to know about this incident and our key takeaways:
-
🚨 Final Call! 🚨 Don't miss out on our upcoming webinar tomorrow! Register now to learn: 1️⃣ What are the mechanisms responders use now to access sensitive resources? 2️⃣ Where are the opportunities ripe for improving current processes? 3️⃣ How an AI company calculates and implements their break glass strategy. 🗓️ Date: July 10th, 2024 🕚 Time: 11:00 AM EST https://lnkd.in/ga_fd3uZ #breakglass #incidentresponse
-
Even as we develop new and innovative ways to make authentication stronger and easier on our users, attackers are proving that they can find workarounds to undermine our security and illicitly access our data. Passkeys are going to have a net positive impact on reducing risk from compromised credentials, which once again make up the number one cause of breaches according to the 2024 Verizon Data Breach Investigations Report. But there are still significant kinks to work out before we get there. Taking a defense in depth approach that assumes that attackers can compromise our credentials, and then implementing measures to reduce any privileges associated with these credentials in order to prevent lateral movement and of course breach of data. https://lnkd.in/gaA8uw2T
Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication
darkreading.com
-
📢 Just 2 weeks left until our webinar: "Empowering Incident Responders with Dynamic Privilege Escalation"! 📢 Don't miss out on this opportunity to learn from industry experts Mandi Walls, DevOps Advocate at PagerDuty, and Aaron Bacchi, Sr. DevOps Engineer at Labelbox. They'll be sharing insights on building a smarter break glass infrastructure to tackle incidents effectively and securely. 🗓️ Date: July 10th, 2024 🕚 Time: 11:00 AM EST Secure your spot today! Register Now 👇
This content isn’t available here
Access this content and more in the LinkedIn app
-
The recent attack on Snowflake accounts underscores a critical lesson for all cloud users: securely managing identities and access is paramount under the shared responsibility model. As more organizations leverage cloud services, it's essential to understand that security is a collaborative effort between the service provider and the customer. Here are some key takeaways: 1️⃣ Shared Responsibility Model: While cloud providers like Snowflake ensure the security of the infrastructure, customers must secure their identities and access management. 2️⃣ Identity Management: Implement strong identity governance to ensure only the right people have the appropriate access to critical data. 3️⃣ Access Control: Use tools and policies to manage and monitor access, reducing the risk of unauthorized access. Listen in to hear our Director of Product, Sharon Kisluk, explain where things went wrong in this major security incident. #snowflakebreach #cybersecurity #identityandaccessmanagement