News & blog
Updates and insights on cybersecurity, machine learning and the cloud.
NEWS & BLOG
Data Guardianship – GDPR: Live it, love it
Data mapping and ongoing inventory updating is the cornerstone of any robust practice of data guardianship. It would be impossible to fulfill a request to delete all of the data he...
Securing Non Employee Access to Cloud Resources
According to the 2019 Verizon Data Breach Investigations Report (DBIR), 34 percent of all breaches in the past year involved an insider threat actor. Companies often need to give t...
Data Guardianship, linking data privacy to power: 2 of 3
In the first post of this series on data guardianship at Obsidian, I introduced our core principles, including a commitment to transparency. In this post, I’m going to dive into ...
Data Guardianship Core Principles: 1 of 3
In cybersecurity, we often hear about the importance of having tidy cyber hygiene and a good security posture, but far less attention has been paid to what it means to have a good ...
Cloud Native Security Summit 2019 Highlights
Last week, Obsidian joined forces with Capsule8 and Signal Sciences to host the second annual Cloud Native Security Summit, an invite-only event for senior security and IT leaders ...
Case Study: Fighting Account Bloat and Identity Sprawl with Obsidian
How do you get a handle on identity sprawl and account bloat when over 20% of your users churn every year? This is the story of one law firm that found an effective way to bring or...
Insider Threats Can Come From Negligence and Carelessness
Since news about the Capital One breach broke, the cybersecurity world has been speculating about how exactly the attack went down. Did one AWS contractor take advantage of privile...
Trashing Shared Documents Is Harder Than It Looks
The Case of the Shared Trash I wrote a letter of recommendation for a colleague using a new letterhead template designed by a design contractor. It was saved in the contractor’s ...