<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Nothing Special   »   [go: up one dir, main page]

Want to master Kubernetes access control? 🚀 Join our upcoming webinar!

Search
Close icon
Search bar icon
strongDM logo

blog

Financial Security in the Cloud: Why IAM & PAM Aren’t Enough

Financial Security in the Cloud: Why IAM & PAM Aren’t Enough

Legacy security models can’t protect modern financial systems. Continuous Authorization ensures real-time, risk-based access control for true Zero
What Is Kubernetes Ingress? Guide to K8s Traffic Management

What Is Kubernetes Ingress? Guide to K8s Traffic Management

This article breaks down Kubernetes Ingress, explaining how it manages external access to services, routing configurations, and best practices.
Kubernetes Secrets: Create, Manage, and Secure k8s Secrets
Kubernetes Secrets: Create, Manage, and Secure k8s Secrets
In this article, we explore everything you need to know about Kubernetes Secrets and how to manage sensitive information in your Kubernetes clusters. You'll learn how to create different types of secrets, understand the various creation methods using kubectl, and discover best practices for using secrets in your applications. By the end of this article, you'll have a comprehensive understanding of how to securely handle credentials, API keys, certificates, and other sensitive data within your
How To List Users in PostgreSQL (psql command & GUI tools)
How To List Users in PostgreSQL (psql command & GUI tools)
Up to 80% of data breaches in the U.S. start with unauthorized access. Without insights into who’s accessing your database, their login privileges, and the duration of each session, it can be difficult to prevent potential security threats. Fortunately, PostgreSQL is a powerful open-source relational database management system you can use to manage access control. Known for its advanced support, complex queries, and rich features, PostgreSQL can list users in your database for security audits,
How To Delete/Remove Users in Linux (userdel, deluser & Manually)
How To Delete/Remove Users in Linux (userdel, deluser & Manually)
As a system administrator, a time will come when you’ll need to delete or remove users in your organization’s Linux system. It could be due to security reasons, routine account management, or organizational changes that require you to remove inactive accounts or offboard employees. Whatever the reason, it's important to do this properly to avoid problems like broken processes, orphaned files, and security vulnerabilities.
Top 9 Cloud Databases for 2025 (Free & Paid)
Top 9 Cloud Databases for 2025 (Free & Paid)
This guide breaks down the top cloud database solutions reshaping how organizations store, manage, and scale data. From relational databases to NoSQL options, we’ll cover what matters most when choosing the right solution for your needs. By the end, you’ll understand how modern cloud databases drive scalability and performance—and which one is the best fit for your organization.
How to Add a User to Sudoers & Sudo Group in Ubuntu Securely
How to Add a User to Sudoers & Sudo Group in Ubuntu Securely
Security best practices recommend that you manage privileged access for Linux distributions like Ubuntu, just as with any other operating system. That’s why most Linux systems have the root user or superuser and regular users. At some point, you may need to elevate a regular user’s privileges so they can execute root-level tasks, such as modifying system configurations and settings. In this case, leveraging sudo can be helpful.
NIST Password Guidelines: 2025 Updates & Best Practices
NIST Password Guidelines: 2025 Updates & Best Practices
The latest updates in NIST Special Publication shift focus from complexity to usability. Key changes include: 1. Prioritizing password length over complexity. 2. Mandating compromised credential screening. 3. Encouraging passwordless authentication methods. 4. Eliminating forced password resets unless compromise is suspected.
Falling Out of Love with Your PAM Solution?
Falling Out of Love with Your PAM Solution?
StrongDM fixes what legacy PAM vendors get wrong. Before you start swiping for a better solution, see why security teams are breaking up with their old PAM—and how StrongDM is helping them fall in love with security again.
The Hidden Costs of Legacy PAM: It’s More Than You Think
The Hidden Costs of Legacy PAM: It’s More Than You Think
At first glance, legacy PAM tools might seem like a safe bet. They’re familiar and established, and they’ve been getting you from here to there for years. But take a look under the hood, and you’ll see that they’re quietly draining your resources.
StrongDM FAQs: Answering Your Most Common Questions
StrongDM FAQs: Answering Your Most Common Questions
Managing secure access to infrastructure shouldn’t be a headache—but for most organizations, it is. That’s where StrongDM comes in. We replace clunky, outdated access solutions with a frictionless, Zero Trust approach that actually makes life easier for IT, DevOps, and security teams. In this FAQ blog post, we’re cutting through the noise to answer the most common questions about StrongDM—what it is, how it works, and why it’s the go-to platform for secure, scalable access.
How to Delete a Postgres User (dropuser & DROP USER)
How to Delete a Postgres User (dropuser & DROP USER)
When working with or administering a database, you'll need to delete, remove, or drop users at some point. This might seem like a routine task, but dropping unnecessary or old users is crucial for maintaining database security. This helps remove access points for malicious actors — both in-house and external — so only authorized individuals can perform operations on it.
The State of Zero Trust Security in the Cloud Report by StrongDM
The State of Zero Trust Security in the Cloud Report by StrongDM
As enterprises increasingly migrate workloads to the cloud, security strategies must adapt to meet evolving threats. Zero Trust, emphasizing identity verification and least privilege access, has become a critical framework for securing cloud environments. StrongDM’s recent survey of 600 cybersecurity professionals sheds light on the progress and challenges organizations face in adopting Zero Trust for the cloud.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. đź‘€