At Oblique, we're helping organizations make their access controls actually maintainable.
Full post: oblique.security/blog/identit...
Dive deeper into these incidents and avoid repeating the same mistakes: oblique.security/blog/authn-f...
Dive deeper into these incidents and avoid repeating the same mistakes: oblique.security/blog/authn-f...
Instead, get approvals from app owners who actually understand the systems and risks, and automate approvals that are always granted.
Instead, get approvals from app owners who actually understand the systems and risks, and automate approvals that are always granted.
Read the report: oblique.security/blog/policie...
Read the report: oblique.security/blog/policie...
Read more in our latest post: oblique.security/blog/delegat...
Read more in our latest post: oblique.security/blog/delegat...
Stop making me learn git. Stop trying to make git happen 💁♀️
oblique.security/blog/git-int...
Stop making me learn git. Stop trying to make git happen 💁♀️
oblique.security/blog/git-int...
I hope you love some red string diagrams 🤣
ventureinsecurity.net/p/the-unbund...
Read more in our latest blog post: oblique.security/blog/rbac-ro...
Read more in our latest blog post: oblique.security/blog/rbac-ro...
Read more in our latest post: oblique.security/blog/comms-a...
Read more in our latest post: oblique.security/blog/comms-a...
Read the post for the new commandments of security teams: franklyspeaking.substack.com/p/the-new-co...
Read the post for the new commandments of security teams: franklyspeaking.substack.com/p/the-new-co...
oblique.security/blog/injecti...
Deep dive into the evolution of authentication in our latest blog post!
oblique.security/blog/history...
Deep dive into the evolution of authentication in our latest blog post!
oblique.security/blog/history...
Better security + Better developer experience 💟
oblique.security/blog/github-...
Better security + Better developer experience 💟
oblique.security/blog/github-...
thesecuritywing.com/making-iam-l...
thesecuritywing.com/making-iam-l...
oblique.security/blog/justifi...
oblique.security/blog/justifi...
Even if you don't know why someone has access, you should be able to figure out if they're using it. Removing unused access isn't risky — never removing access is.
Read more in our latest blog post: oblique.security/blog/chester...
Even if you don't know why someone has access, you should be able to figure out if they're using it. Removing unused access isn't risky — never removing access is.
Read more in our latest blog post: oblique.security/blog/chester...
At Oblique, we're helping organizations make their access controls actually maintainable.
Full post: oblique.security/blog/identit...
At Oblique, we're helping organizations make their access controls actually maintainable.
Full post: oblique.security/blog/identit...