AembitAre You Guilty of These 6 Outdated Workload Identity Practices?Traditional workload identity approaches may be jeopardizing your data security. Signs it’s time to upgrade and embrace modern workload…Oct 20, 2023Oct 20, 2023
AembitThe What, Where, and Why of Workload Identity and Access ManagementWith organizations like yours relying more heavily than ever on distributed systems, cloud computing, and interconnected APIs, the question…Aug 7, 2023Aug 7, 2023
AembitThe Six-Stage Lifecycle of Workload Secrets and How it Impacts Identity and Access ManagementAn often-shared quote goes something like this: “The smartest way to keep a secret is to never have one.” Think about it. You can sidestep…Jul 6, 2023Jul 6, 2023
AembitAembit Launches out of StealthAembit, the identity platform that lets DevOps and Security teams discover, manage, enforce, and audit access between federated workloads…Mar 21, 2023Mar 21, 2023
AembitUsing Terraform to Configure AWS to Periodically Start an EC2 InstanceI am working on a small project around automating scans so we can automatically test our SaaS service. Ultimately, we decided to run the…Feb 13, 2023Feb 13, 2023
AembitAembit vs. SPIFFE/SPIREWorkload identity is a necessary but relatively new area of cybersecurity, and customers and vendors are trying to understand the core…Feb 9, 2023Feb 9, 2023
AembitInfrastructure as Code is More Complicated than you Think.Infrastructure as Code (IaC) is fantastic. It’s light-years ahead of manual infrastructure configuration and modification.Dec 13, 2022Dec 13, 2022
AembitAembit vs. Secrets ManagersAembit’s (unofficial) motto is to “Manage Access, not Secrets.” That being said, in many cases, we do need to deal with secrets to enable…Dec 9, 2022Dec 9, 2022