<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon
strongDM logo

blog

The Annual Access Audit Survival Guide

The Annual Access Audit Survival Guide

So, you’ve decided to conduct an annual access audit. Now comes the obvious question: where do I start? Just like you wouldn’t embark on a mountain
The Power of Remote Work: Creating a More Inclusive Workplace

The Power of Remote Work: Creating a More Inclusive Workplace

It’s undeniable: remote work is a catalyst for positive change, bridging gaps, and creating a more equitable and interconnected world. The benefits
Annual Access Audit: What Is It and How to Conduct It?
Annual Access Audit: What Is It and How to Conduct It?
The great outdoors and your infrastructure have more in common than you might think. Both environments have diverse ecosystems and unique terrain, but they can also feel wild and untamed. In the spirit of adventuring and access, we wrote this blog to help you learn why you should conduct an annual access audit every year.
3 Reasons Why Least Privilege Has Failed
3 Reasons Why Least Privilege Has Failed
The inability to audit, track, and understand how permissions are being used (or if they’re used at all) has been non-existent. Until now. The findings are clear: organizations need visibility into privileged access and its usage to fully understand and address their total attack surface.
What’s New at StrongDM | April 2023
What’s New at StrongDM | April 2023
Spring has sprung and the audits will come. How efficient are you at audit preparation? At StrongDM we reduce the administrative load and help customers get answers to the questions they need to reach regulatory compliance for internal and external audits.
New Feature Deep Dives: Advanced Insights 🔐
New Feature Deep Dives: Advanced Insights 🔐
One thing is clear in the software space: New features aren’t adopted if they don’t solve specific problems for the people who actually use the product. Solving real problems means conducting research and asking hard questions. It means gathering evidence and interviewing multiple customers as well as leaders in the space to relieve the pain and positively impact the business.
StrongDM vs. Teleport: Side-by-Side Comparison
StrongDM vs. Teleport: Side-by-Side Comparison
Both StrongDM and Teleport are access control solutions designed to provide secure access to databases, servers, clusters, and web apps. While there are some similarities between the two solutions, there are also some key differences.
7 Cyber Insurance Requirements (And How to Meet Them)
7 Cyber Insurance Requirements (And How to Meet Them)
Organizations must meet comprehensive cyber insurance requirements to qualify for coverage. This article defines seven key cybersecurity insurance requirements. Adhering to these requirements will ensure you’ve covered your bases in case of a claim.
Augmenting Legacy PAM with StrongDM: Getting to Dynamic Access
Augmenting Legacy PAM with StrongDM: Getting to Dynamic Access
We constantly hear about the gender gap in technology. Whether it’s the shortage of female founders and CEOs, claims of discrimination, or the comparatively small number of women in computer science majors, it seems that the issue has become a regular feature story in the news cycle. Disagreement over how to respond abounds on social media, in editorials, and not infrequently within tech companies themselves.
33+ Must-Know Women In Tech Statistics for 2024
33+ Must-Know Women In Tech Statistics for 2024
We constantly hear about the gender gap in technology. Whether it’s the shortage of female founders and CEOs, claims of discrimination, or the comparatively small number of women in computer science majors, it seems that the issue has become a regular feature story in the news cycle. Disagreement over how to respond abounds on social media, in editorials, and not infrequently within tech companies themselves.
CISA Zero Trust Maturity Model (TL;DR Version)
CISA Zero Trust Maturity Model (TL;DR Version)
In the 1990s, the TV series “The X-Files” made the phrase “Trust No One” popular. Now, with cybercrime increasing at an alarming rate, “trust no one” – or Zero Trust – is a phrase echoing through enterprises. In 2021, the average number of cyberattacks and data breaches increased by 15.1%. That same year, the U.S. government spent $8.64 billion of its $92.17 billion IT budget to combat cybercrime. It also released the CISA Zero Trust Maturity Model.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.