<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

What Is Access Certification? Process, Benefits & Best Practices

What Is Access Certification? Process, Benefits & Best Practices

Access certification is more than a checkbox; it’s how you prove and enforce least privilege at scale. It ensures every user, system, and role has
What Is Authorization? Types, Examples, and How It Works

What Is Authorization? Types, Examples, and How It Works

Authorization isn’t just about who gets in, it’s about what they can do once they’re inside. And that’s where most breaches happen. Whether you're
Workforce Identity and Access Management (IAM) Explained
Workforce Identity and Access Management (IAM) Explained
Workforce identity and access management (IAM) secures your internal users, employees, contractors, and engineers by verifying who they are, controlling what they can do, and monitoring how they interact with sensitive systems. It’s the foundation of Zero Trust in a cloud-first world. This guide breaks down everything from SSO and MFA to RBAC, JIT access, and directory services, and how they all work together to keep your workforce productive and protected.
From Legacy PAM to Identity Firewall: The Shift is Here
From Legacy PAM to Identity Firewall: The Shift is Here
More than just an incremental improvement, the Identity Firewall is an architectural transformation that enables both security and velocity in modern environments. Organizations ready to lead this transformation will build competitive advantages that extend far beyond security compliance.
The State of Compliance in Financial Institutions Report by StrongDM
The State of Compliance in Financial Institutions Report by StrongDM
StrongDM’s latest survey of 1,000 IT, compliance, and security professionals at financial institutions and fintech firms reveals a telling picture: while confidence in compliance planning is high, operational challenges persist, especially around privileged access management and audit preparedness.
SSH ProxyJump Explained (and a Better Alternative)
SSH ProxyJump Explained (and a Better Alternative)
SSH ProxyJump (the -J flag) is a more streamlined way to hop between SSH hosts using one or more bastion hosts. Instead of chaining multiple manual connections, ProxyJump creates a single end-to-end SSH session through the specified jump hosts. It was introduced in OpenSSH 7.5 to simplify access to servers that sit behind firewalls or live in private networks.
Data Breach Response Plan: Your Guide to Leak Prevention
Data Breach Response Plan: Your Guide to Leak Prevention
A breach isn’t a matter of if, it’s when. In 2023 alone, around 97 million accounts were breached in the US, accounting for one in three cases worldwide. Whether it’s a rogue insider, a phishing attack, or a third-party screwup, your best shot at bouncing back fast is having a clear, tested data breach response plan. This guide walks you through what to include: governance roles, incident severity levels, NIST-based response steps, legal obligations (like GDPR, HIPAA, and CCPA), and
MySQL SHOW USERS: How to List All Users in a Database
MySQL SHOW USERS: How to List All Users in a Database
Learn how to list MySQL users using SQL queries and GUI tools like Workbench and phpMyAdmin. Discover how to check privileges, manage accounts, and secure access with best practices, and see how StrongDM simplifies MySQL user management.
Hackers Don’t Hack In. They Log In.
Hackers Don’t Hack In. They Log In.
Most breaches don’t begin with hacking—they start with logging in. Discover how compromised credentials fuel modern cyberattacks and why Zero Trust Privileged Access is essential for securing today’s identity-driven environments.
Kubernetes Security: Guide to Securing Your Clusters
Kubernetes Security: Guide to Securing Your Clusters
Kubernetes security is the practice of protecting containerized workloads and cluster components from unauthorized access, misconfigurations, and vulnerabilities. It involves securing the infrastructure, clusters, containers, and application code through layered controls like RBAC, network policies, image scanning, and runtime protection.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀