The Privileged Access Blog

The Migus Group’s blog covering identity and access management, PAM, DevSecOps, IT operations and other topics related to enterprise security.
Securely authenticate to the AWS CLI with vaulted Access Keys

Securely authenticate to the AWS CLI with vaulted Access Keys — December 6, 2023

Vaulting your AWS Access Keys is a crucial security measure to protect your cloud resources and workloads. This tutorial explores the steps needed to securely store AWS credentials in Keeper’s zero-knowledge vault and configure the AWS CLI to authenticate using Keeper’s open-source credential process integration.

Service Account Protection: Critical Strategic Cybersecurity

Service Account Protection: Critical Strategic Cybersecurity — November 6, 2023

Service accounts are the silent workhorses of the IT environment. From executing automated services to managing virtual machine instances, these specialized accounts are integral to the smooth running of crucial business applications. However, their importance in cybersecurity is disproportionately overlooked.

Sign Git Commits Securely With Vaulted SSH Keys

Sign Git Commits Securely With Vaulted SSH Keys — October 17, 2023

Learn how to use Keeper Security’s Vault to store and sign your git commits with SSH keys and verify them on GitHub.

Top 7 Cybersecurity Terms To Know

Top 7 Cybersecurity Terms To Know — May 8, 2023

Cybersecurity has its own language — and you need to know it. Check out these top cybersecurity terms.

What Is a Proactive Cybersecurity Program?

What Is a Proactive Cybersecurity Program? — May 2, 2023

Anticipate and reduce threats with a proactive cybersecurity program. Learn how this approach differs from reactive tactics and how to implement it.

Passkey vs Password: What Is a Passkey?

Passkey vs Password: What Is a Passkey? — April 18, 2023

Many cyber risks stem from problems with login credentials. Learn about secure alternatives in our passkey vs password comparison.

How To Identify Cyber Risk in Your Company

How To Identify Cyber Risk in Your Company — April 11, 2023

Financial losses from a security event can harm your company. Understanding your cyber risk helps you prioritize actions. Learn how to assess threats.

Understanding Privileged Access Management

Understanding Privileged Access Management — April 4, 2023

Privileged access management (PAM) is a high-priority cybersecurity defense strategy. Upgrade and implement your PAM solutions set with your trusted strategic partner.

An Overview of the Cybersecurity Risk Management Process

An Overview of the Cybersecurity Risk Management Process — March 28, 2023

Managing, mitigating and eliminating your cybersecurity risks require a comprehensive process. Conduct your cybersecurity risk assessments and upgrade your state of readiness.

What Is an IAM Assessment and How Does It Work?

What Is an IAM Assessment and How Does It Work? — March 22, 2023

An IAM assessment is a critical part of maintaining cybersecurity strength organization-wide. Consider scheduling your IAM assessment with a strategic partner today.

Build a custom security foundation

Click the button below and a team member will be in touch with you shortly.