Identity Federation on AWS and Azure Instances

Why? That’s a good starting question to start with, what’s the goal? Here we’re talking about managing access to instances on AWS and Azure in a unified way and there’s a bunch of possibilities, including (not exhaustive): Local users from a csv list with a script Local users using a configuration management tool Using a central directory (NIS, AD, LDAP) Using strongDM While the two first options are legit for

Read more

Director of IT & Operations at Chef on What it Means to be Secure

ShareAbout Token SecurityAt Token Security our goal is to teach the core curriculum for modern DevSecOps. Each week we will deep dive with an expert so you walk away with practical advice to apply to your team today. No fluff, no buzzwords.About This EpisodeThis week we are joined by Ben Rockwood, Director of IT & Operations at Chef who shares what it means to be secure, and how compliance and

Read more

Daniel Leslie Director of Security Intelligence & IT Operations at Namely on the Human Side of Security

ShareAbout Token SecurityAt Token Security our goal is to teach the core curriculum for modern DevSecOps. Each week we will deep dive with an expert so you walk away with practical advice to apply to your team today. No fluff, no buzzwords.About This EpisodeThis week we are joined by Daniel Leslie at Namely who shares his take on the human side of security, and what security at scale looks like

Read more

Token Security Podcast | Alan Daines Chief Information Security Officer at FactSet on Phishing

ShareAbout Token SecurityAt Token Security our goal is to teach the core curriculum for modern DevSecOps. Each week we will deep dive with an expert so you walk away with practical advice to apply to your team today. No fluff, no buzzwords.About This EpisodeIn this episode Max Saltonstall and Justin McCarthy are joined by Alan Daines, Chief Information Security Officer at FactSet to talk about phishing, educating on it, and

Read more

Password Policy Best Practices

Passwords are one of the most common targets for hackers, so it’s imperative that your company enforce a strong password policy. This policy will not only define the requirements of the password itself but the procedure your organization will use to select and securely manage passwords.

Read more

Token Security Podcast | Will Charczuk of Blend pt. 2

ShareAbout Token SecurityWelcome! This is the inaugural episode of Token Security, our goal is to teach the core curriculum for modern devsecops. Each week we will go deep with an expert on a specific topic so you walk away with practical advice to apply to your team today. No fluff, no buzzwords.About This EpisodeThis episode we sit down with Will Charczuk, Engineering Group Lead at Blend. Will oversees the service

Read more