Procyon Blog
Everything you need to know about cloud and user identity
Kubernetes Access Management: The Ultimate Guide to Securing Your Cluster (Without the Headaches)
Kubernetes has taken the world of app development by storm, becoming the platform for managing containers and orchestrating workloads. But with...
IAM Oh Shit Moments
#IAMFailsIdentity and Access Management (IAM) is the bedrock of modern cybersecurity. It's the gatekeeper that ensures the right individuals have...
The Evolution of Access Management with Decentralized Identity
Procyon Dictionarydecentralized identity[dee-sen-truh-lahyzd, ahy-den-ti-tee]Decentralized identity is a system where individuals control their own...
Protecting Your Cloud Data: Crucial Lessons from the Snowflake Breach
Cloud data powerhouse Snowflake is making headlines, but not for reasons they’d prefer. A notorious hacking group, UNC5537, has been targeting...
Behind the Breach: Understanding the Sisense Cybersecurity Incident and Securing Credentials
The Sisense Breach: Why Strengthening Credential Security is Priority In today's interconnected digital landscape, cybersecurity breaches have...
Evolution of modern identity stack
Identity and access management traces its roots back to the mainframe era. DoD first employed logical access controls by mandatory and discretionary...
Passkeys and Security 2.0 concepts
Image credit: Unsplash Passkeys are emerging as a popular passwordless phishing resistant authentication technology. Passkey is a friendly brand...
Code to cloud: verifiable deployments
Image credit: Unsplash Ken Thompson the creator of Unix operating system and C programming language gave his now famous Turing award acceptance...
Workload Identity in Security 2.0 Stack
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly privileged human users. In this post...
Privileged users in Security 2.0 Stack
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become the source of a software...
Security 2.0
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we include all the packages we import...
Procyon Achieves SOC 2 Type 2 Compliance, Signifying Commitment to Data Security and Client Trust
[San Jose, CA, October 20th, 2023] — Procyon, a leading provider of next generation cloud-based privilege access management solution, is...
Kubernetes Access Management: The Ultimate Guide to Securing Your Cluster (Without the Headaches)
Kubernetes has taken the world of app development by storm, becoming the platform for managing containers and orchestrating workloads. But with...
IAM Oh Shit Moments
#IAMFailsIdentity and Access Management (IAM) is the bedrock of modern cybersecurity. It's the gatekeeper that ensures the right individuals have...
The Evolution of Access Management with Decentralized Identity
Procyon Dictionarydecentralized identity[dee-sen-truh-lahyzd, ahy-den-ti-tee]Decentralized identity is a system where individuals control their own...
Protecting Your Cloud Data: Crucial Lessons from the Snowflake Breach
Cloud data powerhouse Snowflake is making headlines, but not for reasons they’d prefer. A notorious hacking group, UNC5537, has been targeting...
Behind the Breach: Understanding the Sisense Cybersecurity Incident and Securing Credentials
The Sisense Breach: Why Strengthening Credential Security is Priority In today's interconnected digital landscape, cybersecurity breaches have...
Evolution of modern identity stack
Identity and access management traces its roots back to the mainframe era. DoD first employed logical access controls by mandatory and discretionary...
Passkeys and Security 2.0 concepts
Image credit: Unsplash Passkeys are emerging as a popular passwordless phishing resistant authentication technology. Passkey is a friendly brand...
Code to cloud: verifiable deployments
Image credit: Unsplash Ken Thompson the creator of Unix operating system and C programming language gave his now famous Turing award acceptance...
Workload Identity in Security 2.0 Stack
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly privileged human users. In this post...
Privileged users in Security 2.0 Stack
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become the source of a software...
Security 2.0
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we include all the packages we import...
Procyon Achieves SOC 2 Type 2 Compliance, Signifying Commitment to Data Security and Client Trust
[San Jose, CA, October 20th, 2023] — Procyon, a leading provider of next generation cloud-based privilege access management solution, is...
Kubernetes Access Management: The Ultimate Guide to Securing Your Cluster (Without the Headaches)
Kubernetes has taken the world of app development by storm, becoming the platform for managing containers and orchestrating workloads. But with...
IAM Oh Shit Moments
#IAMFailsIdentity and Access Management (IAM) is the bedrock of modern cybersecurity. It's the gatekeeper that ensures the right individuals have...
The Evolution of Access Management with Decentralized Identity
Procyon Dictionarydecentralized identity[dee-sen-truh-lahyzd, ahy-den-ti-tee]Decentralized identity is a system where individuals control their own...
Protecting Your Cloud Data: Crucial Lessons from the Snowflake Breach
Cloud data powerhouse Snowflake is making headlines, but not for reasons they’d prefer. A notorious hacking group, UNC5537, has been targeting...
Behind the Breach: Understanding the Sisense Cybersecurity Incident and Securing Credentials
The Sisense Breach: Why Strengthening Credential Security is Priority In today's interconnected digital landscape, cybersecurity breaches have...
Evolution of modern identity stack
Identity and access management traces its roots back to the mainframe era. DoD first employed logical access controls by mandatory and discretionary...
Passkeys and Security 2.0 concepts
Image credit: Unsplash Passkeys are emerging as a popular passwordless phishing resistant authentication technology. Passkey is a friendly brand...
Code to cloud: verifiable deployments
Image credit: Unsplash Ken Thompson the creator of Unix operating system and C programming language gave his now famous Turing award acceptance...
Workload Identity in Security 2.0 Stack
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly privileged human users. In this post...
Privileged users in Security 2.0 Stack
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become the source of a software...
Security 2.0
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we include all the packages we import...
Procyon Achieves SOC 2 Type 2 Compliance, Signifying Commitment to Data Security and Client Trust
[San Jose, CA, October 20th, 2023] — Procyon, a leading provider of next generation cloud-based privilege access management solution, is...
Kubernetes Access Management: The Ultimate Guide to Securing Your Cluster (Without the Headaches)
Kubernetes has taken the world of app development by storm, becoming the platform for managing containers and orchestrating workloads. But with...
IAM Oh Shit Moments
#IAMFailsIdentity and Access Management (IAM) is the bedrock of modern cybersecurity. It's the gatekeeper that ensures the right individuals have...
The Evolution of Access Management with Decentralized Identity
Procyon Dictionarydecentralized identity[dee-sen-truh-lahyzd, ahy-den-ti-tee]Decentralized identity is a system where individuals control their own...
Protecting Your Cloud Data: Crucial Lessons from the Snowflake Breach
Cloud data powerhouse Snowflake is making headlines, but not for reasons they’d prefer. A notorious hacking group, UNC5537, has been targeting...
Behind the Breach: Understanding the Sisense Cybersecurity Incident and Securing Credentials
The Sisense Breach: Why Strengthening Credential Security is Priority In today's interconnected digital landscape, cybersecurity breaches have...
Evolution of modern identity stack
Identity and access management traces its roots back to the mainframe era. DoD first employed logical access controls by mandatory and discretionary...
Passkeys and Security 2.0 concepts
Image credit: Unsplash Passkeys are emerging as a popular passwordless phishing resistant authentication technology. Passkey is a friendly brand...
Code to cloud: verifiable deployments
Image credit: Unsplash Ken Thompson the creator of Unix operating system and C programming language gave his now famous Turing award acceptance...
Workload Identity in Security 2.0 Stack
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly privileged human users. In this post...
Privileged users in Security 2.0 Stack
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become the source of a software...
Security 2.0
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we include all the packages we import...
Procyon Achieves SOC 2 Type 2 Compliance, Signifying Commitment to Data Security and Client Trust
[San Jose, CA, October 20th, 2023] — Procyon, a leading provider of next generation cloud-based privilege access management solution, is...