Articles tagged with: #iam Clear filter
How to look for opportunuties in UK / Germany based startups who is looking for a long term commitments and growth?

How to look for opportunuties in UK / Germany based startups who is looking for a long term commitments and growth?

cybersecurity www.reddit.com

A brief on myself, I have 2.5 years of experience in cybersecurity, and currently employed in one of product based MNC worked with many security teams within current organisation, few based on requirement and few on situations. I have good amount of experience on security engineering part of cybersecurity, managing and deploying SIEM , SOAR, IAM, AD, security automation and Threat intell platforms. How to look or research to work with startups or small / non tech companies (money is not the...

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

The Hacker News thehackernews.com

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

I've got a position in IAM for O365 and Active Directory Admin and I'm looking for the best sources and advices I can get to start with the right foot!

I've got a position in IAM for O365 and Active Directory Admin and I'm looking for the best sources and advices I can get to start with the right foot!

cybersecurity www.reddit.com

I worked as an integrator junior and just got my first real position in the area but I'm a bit afraid of what is coming. I know they expect me to lack some experience, but I wanted to tackle all the theoretical aspects of the area and show that I can do it. They want me to start with system hardening and configuration while participating in the integration of different sites and the application of a tiering model t1 en cours. Any help from videos to book sources or websites is welcomed. I would...

SkyEye: When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud

SkyEye: When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud

cs.CR updates on arXiv.org arxiv.org

arXiv:2507.21094v2 Announce Type: replace Abstract: In recent years, cloud security has emerged as a primary concern for enterprises due to the increasing trend of migrating internal infrastructure and applications to cloud environments. This shift is driven by the desire to reduce the high costs and maintenance fees associated with traditional on-premise infrastructure. By leveraging cloud capacities such as high availability and scalability, companies can achieve greater operational...

DORA , BAIT certification / get basic knowledge for IT security : IAM

DORA , BAIT certification / get basic knowledge for IT security : IAM

cybersecurity www.reddit.com

Hello Fellow Cybersec colleagues, I have been tasked with a new role, which is to learn and understand how DORA , BAIT can be implemented, assessed in and around an Identity and Access Management system. As these are primary compliance related laws , Acts which most of the companies now want to be compliant with , I want to know how can an experience IAM professional

Unlock new possibilities: AWS Organizations service control policy now supports full IAM language

Unlock new possibilities: AWS Organizations service control policy now supports full IAM language

AWS Security Blog aws.amazon.com

Amazon Web Service (AWS) recently announced that AWS Organizations now offers full AWS Identity and Access Management (IAM) policy language support for service control policies (SCPs). With this feature, you can use conditions, individual resource Amazon Resource Names (ARNs), and the NotAction element with Allow statements. Additionally, you can now use wildcards at the beginning or middle of

Can this scenario be considered MFA?

Can this scenario be considered MFA?

cybersecurity www.reddit.com

Let's say I have a service which requires IAM. My authentication procedure is as follows: - user presents login and password - a code is sent to the user's email address - user enters the correct code In case the user forgets the password, the procedure is: - send a reset password link to the user's email address - user clicks on the link - user selects a new password. My understanding is that MFA should add a second layer of security. In this scenario, the expected outcome is that the attacker...

Released an open source SOC2 compliance scanner after seeing startups get quoted $50k for basic AWS security checks

Released an open source SOC2 compliance scanner after seeing startups get quoted $50k for basic AWS security checks

cybersecurity www.reddit.com

Was removed from /r/sysadmin because it seemed like advertising, but I'm not trying to sell anything - it's Apache 2.0. Just tired of seeing companies pay enterprise prices for grep and curl: I built a simple scanner that checks the technical parts of SOC2 (the ~30% that's actually infrastructure). It's not a complete compliance solution - won't write your policies or track vendor assessments. But it will tell you which S3 buckets are public, which IAM users lack MFA, and which access keys...

Anyone running Zero Trust in the cloud without it becoming a mess?

Anyone running Zero Trust in the cloud without it becoming a mess?

cybersecurity www.reddit.com

Every vendor pitches "Zero Trust everywhere" like it's easy. Reality for us: IAM sprawl, too many service accounts, and conditional access policies that feel like duct tape. We're multi-cloud (AWS + GCP) and trying to align with NIST Zero Trust principles, but enforcing least privilege without breaking stuff has been brutal. Anyone got a cloud-native setup they trust that doesn't devolve into constant exceptions? submitted by /u/Zaughtilo [link] [comments]

Fabrix Security Raises $8M to Launch AI-Driven Enterprise Identity Solution

Fabrix Security Raises $8M to Launch AI-Driven Enterprise Identity Solution

Cyber Security - AI-Tech Park ai-techpark.com

Built on AI from the ground up, Fabrix brings AI to IAM, revolutionizing how enterprises can manage and secure both human and non-human identities across all environments Fabrix Security today emerged from stealth with $8 million in seed funding to introduce Fabrix, an AI-Native Identity Security solution that enables enterprises to...

AWSDoor  -  New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

AWSDoor - New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment

Cyber Security News cybersecuritynews.com

Attackers are increasingly leveraging sophisticated techniques to maintain long-term access in cloud environments, and a newly surfaced tool named AWSDoor is emerging as a major threat. AWSDoor automates a range of IAM and resource-based persistence methods, allowing adversaries to hide in plain sight within AWS accounts without deploying traditional malware. Key Takeaways1. AWSDoor exploits IAM

Transition into cybersecurity domain

Transition into cybersecurity domain

cybersecurity www.reddit.com

Hi I'm a software Engineer with 3.5 years of experience in web development mostly worked on php javascript react laravel sql in core dev but lately I started looking into cybersecurity and specially IAM related areas I want to transition from software Engineer to iam related roles for which I was guided that I should learn iam basic concepts completely then slowly transition to learn workflow using one tool whichever is easily available to make sure I'm able to put my concepts to good use them...

10 Best Cloud Penetration Testing Companies in 2025

10 Best Cloud Penetration Testing Companies in 2025

Cyber Security News cybersecuritynews.com

As more businesses migrate their infrastructure to the cloud, cloud penetration testing has become a critical service. Unlike traditional network tests, cloud pentesting focuses on unique attack vectors such as misconfigured services, insecure APIs, and overly permissive IAM (Identity and Access Management) policies. In 2025, the best companies in this field combine deep knowledge of