<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
strongDM logo

blog

10 Tips to Prevent Software Engineer Burnout

10 Tips to Prevent Software Engineer Burnout

Haystack analytics found that 81% of developers suffer from burnout. We’re at crisis-level numbers and it’s clear that developers need support. It
How to Implement Zero Trust (Step-by-Step Guide)

How to Implement Zero Trust (Step-by-Step Guide)

In this blog, we’ll offer a blueprint for how to implement Zero Trust security effectively to help your organization initiate and manage access
What K-Pop Taught Me About Building Innovative, Usable Software
What K-Pop Taught Me About Building Innovative, Usable Software
K-Pop, it turns out, is kind of like a great laboratory of what happens when you prioritize your audience. In a weird way, K-Pop bands are doing what technology companies should be doing - innovating with technology and giving users better, easier, more usable access to the things they need.
Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) is the systematic control and oversight of vendor access to an organization's systems, applications, and data. It involves processes such as onboarding and offboarding vendors, utilizing solutions for Just-in-Time access, ensuring security, and streamlining workflows to minimize operational inefficiencies.
What Is Fine-Grained Access Control? Challenges, Benefits & More
What Is Fine-Grained Access Control? Challenges, Benefits & More
Fine-grained access control systems determine a user’s access rights—to infrastructure, data, or resources, for example—once past initial authentication. Unlike coarse-grained access control (CGAC), which relies on a single factor, such as role, to grant access, FGAC relies on multiple factors. For example, it may consider policies (policy-based access control, or PBAC), attributes (attribute-based access control, or RBAC), or a user’s behavior in a certain context (behavior-based access
What’s New at StrongDM | November 2023
What’s New at StrongDM | November 2023
November has been an electrifying month for us, filled with anticipation and hard work. We are thrilled to share the latest and greatest from the team as we establish the foundation for our newest capabilities.
AWS re:Invent 2023 Recap: RDS for Db2, EKS Pod Identity & More
AWS re:Invent 2023 Recap: RDS for Db2, EKS Pod Identity & More
re:Invent 2023 was AWS’ 12th conference, and it did not disappoint. More than 50,000 of us descended onto Las Vegas for a week of learning, networking, and discussing all things cloud. The campus was insanely large, spanning most of the Las Vegas strip, so that meant we got our steps in! We had some fun along the way, as well, at the many social gatherings, parties and amazing musical experience re:Play.
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
People come, and people go, and while digital identities should cease to exist after a departure, many times, this doesn’t happen. At any given time, organizations can have thousands of user identities to manage and track, so when processes aren’t automated, it’s easy for many identities to fall through the cracks. This phenomenon is called Identity Lifecycle Management, and when it comes to access and security, it’s worth the time to get it right.
Unlocking Continuous Zero Trust Authorization with Strong Policy Engine
Unlocking Continuous Zero Trust Authorization with Strong Policy Engine
We are thrilled to announce an exciting new addition to the StrongDM Dynamic Access Management (DAM) platform: Continuous Zero Trust Authorization. This powerful capability can help organizations leap forward in the Zero Trust journey by enabling continuous, contextual, and granular authorization and control over resources and data
Reduce Security Risk with StrongDM Device Trust
Reduce Security Risk with StrongDM Device Trust
We are thrilled to announce a new feature to our StrongDM® Dynamic Access Management (DAM) platform: Device Trust. This feature amplifies your organization's security posture by employing device posture data from endpoint security leaders CrowdStrike or SentinelOne.
How to Meet NYDFS Section 500.7 Amendment Requirements
How to Meet NYDFS Section 500.7 Amendment Requirements
The New York Department of Financial Services (“NYDFS”) Cybersecurity Regulation is a set of comprehensive cybersecurity requirements that apply to financial institutions operating in New York. The goal of the regulation is to ensure that the cybersecurity programs of financial institutions have robust safeguards in place to protect customer data and the financial sector.
What’s New at StrongDM | October 2023
What’s New at StrongDM | October 2023
As the autumn leaves fall and Halloween costumes are tucked away, it's time to share product updates before we gather around the Thanksgiving table. This month, StrongDM dives into the passwordless future using cloud-native authentication to meet modern infrastructure demands. Also coming soon, keep an eye out for Device Trust: A new feature that adds critical context to your access connections and narrows the aperture for risk. Read the details below.
AWS Well-Architected Framework Security Best Practices
AWS Well-Architected Framework Security Best Practices
The AWS Well-Architected Framework has been a staple for many years for AWS practitioners of all sorts, including cloud architects and platform engineers. It’s a blueprint for architectural and design best practices that will lay the foundation for resilience, operational efficiency, and security on the AWS Cloud.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀