
The JRTF #StopRansomware Guide and
The Principle of Least Privilege
Ransomware attacks have risen by 13% in the last five years, with an average cost of $1.85 million per incident. There are 1.7 million ransomware

Why Enterprises Need YouAttest for AWS
for Identity Security and Compliance
Announcing: YouAttest for AWS. YouAttest automates the process of access discovery and access review for AWS IAM – all the roles and privileges of your

Access Discovery and User Access Reviews
A first step to secure identities is an access discovery. This is an inventory of who has access to what. For outsiders –

Poorly Governed Financial Systems and Fraud –
It Starts with Access Controls
Note: This article is an abbreviated version of an article submitted to the Association of Certified Fraud Examiners (ACFE) journal. Overview: Access/Identity control is a

The Unseen Guardian: Identity Security and Attestation in Manufacturing and OT Systems
As organizations face mounting difficulty in adapting legacy OT systems in manufacturing environments, one element has remained a relative constant – The need for identity

Revolutionize Your Cybersecurity with YouAttest IGA for Attestation: Protecting All Identity Types in the Digital Age
Introduction In today’s highly connected digital landscape, organizations face a myriad of security challenges in protecting their sensitive data and systems. One of the most

Ransomware,
The CSBS R-SAT
and Identity Governance
CSBS has created a very important doc for the banking association concerning ransomware. The document is called the R-SAT (Ransomware Self-Assessment Tool). The CSBS R-SAT

Group and User Entitlement Reviews with YouAttest
In light of the the recent hacks, especially the U.S. Massachusetts Air National Guardsman Jack Teixeira exfiltrating critical defense data – we felt the need

The Hacks of 2023 – And How/Where Attestation Could Have Helped
Relevant topic since YouAttest and friends is giving a talk on how Attestation can help mitigate or at least lessen the frequency and severity of

CIEM, Cloud Resources and User Access Reviews
CIEM is becoming a discussion point for all of us in identity management and identity governance. CIEM is defined as Cloud Infrastructure Entitlement Management –

Salesforce Entitlement Auditing
by YouAttest
Saleforce auditing is a crucial part of finanical audits, especially SOX audits. There are key questions that must be answered to conduct these audits: Does

Identity Access Management (IAM) for European Financial Institutions – The IGA Gaps
Introduction Identity Access Management (IAM) has become increasingly important in the financial sector, particularly with the growing number of digital financial services. IAM refers to