Sitaraman LakshminarayananMissing piece in Product Security puzzleProduct Security in many organizations is chartered to focus on Security of the products — whether its Device, Software or Cloud Service…Jan 21, 2022Jan 21, 2022
Sitaraman LakshminarayananZero Trust & IAMIdentity & Access Management is at the core of Zero Trust Architecture. This is about authenticating users before granting access to any…Aug 27, 2021Aug 27, 2021
Sitaraman LakshminarayananIntroduction to Data Security & PrivacyEveryone knows why Data Security & Privacy are important and want to do the right thing, but where they diverge is how to implement /…Aug 23, 2021Aug 23, 2021
Sitaraman LakshminarayananZero Trust — what is and what is not a ZT solutionEvery vendor seems to have a Zero Trust solution and there are some who might think a single vendor’s Zero Trust solution would solve all…Jul 4, 2021Jul 4, 2021
Sitaraman LakshminarayananYou have done Threat Modeling Whats next?Threat Modeling is a common term within Security Professionals and is often used to identify threats/risks in the hope of mitigating those…Jul 27, 2020Jul 27, 2020
Sitaraman LakshminarayananZero Trust — Where should you begin?With buzz words around Multi Cloud / Cloud Native, it is reasonable to expect Zero Trust being used heavily in sales & marketing. I saw a…Feb 26, 2020Feb 26, 2020
Sitaraman LakshminarayananIs it really worth to charge customers for Single Sign On feature?It’s 2020 and we still have products that does not offer Single Sign on as part of basic feature. If you have told me its expensive to…Jan 11, 2020Jan 11, 2020
Sitaraman LakshminarayananHas Authorization evolved in 20 years?Its been 20 years since i started working and later half was pretty much full time in to Building Security within…Feb 10, 2019Feb 10, 2019
Sitaraman LakshminarayananSecurity questions by an 8 year old girlThis post is about my conversation with my daughter who asked questions which gave me an opportunity to tell her what I do. A couple of…Nov 25, 2017Nov 25, 2017
Sitaraman LakshminarayananREST API can we get rid of Basic Auth?Every application either exposes REST API or is consuming REST API. I am still amazed HTTP Basic Auth is the most commonly used…Mar 10, 2017Mar 10, 2017