The Blog

Thoughts and News from Trustle

Informative. Insightful. Inspirational.

Vandelay Chronicles: This is the Story of Cal

In the last installment, we learned about Vandelay Industries, and how their lack of a just-in-time (JIT) access…

Geremy Cohen
Geremy Cohen | February 13, 2024
Enhance your control capabilities with Trustle's latest feature: Fine-Grained Access and Provisioning Controls

We are excited to announce a significant improvement to our identity management and access control solutions at Trustle…

Christian portrait
Christian Pfarher | January 17, 2024
Streamline User Management with the Trustle Integration for Okta Directory

Effective user management is crucial for maintaining a secure and organized digital workspace. With Trustle's new Okta…

Georgina portrait
Georgina Olivieri | November 08, 2023
MGM aftermath: A New Era of Corporate Cyber & Identity Threats

In our last post, we discussed a trend in identity-based social-engineering attacks that has become so commonplace; it's…

Geremy Cohen
Geremy Cohen | September 19, 2023
Okta's Phishing and MFA Social Engineering Attack

Many years ago, I attended  a security conference and observed a demonstration on how ‘easy’ it is to get into a car…

Geremy Cohen
Geremy Cohen | September 11, 2023
Trustle Takeaways: Black Hat USA 2023

Black Hat 2023 was in full swing this year, with a buzzing tradeshow floor and buckets of  in-person networking…

Emiliano portrait
Emiliano Berenbaum | September 07, 2023
Embracing ITDR: Finessing Access Management in Today’s Complex Digital Landscape

In today’s increasingly complex cloud environments, companies are struggling to answer these fundamental questions:

  • Who are my users? 
  • What can they access? 
  • How did they obtain this access?
  • Do they need this access, and how often?
Josh portrait
Josh Lange - Chief Revenue Officer | August 01, 2023
The Vandelay Chronicles: Access Management for All

Volume 1: A day in the life of a principal engineer at a high growth tech company

Question:  Who doesn’t love a pop quiz…

Geremy Cohen
Geremy Cohen | July 19, 2023
CEO POV: Trustle Welcomes Marc Boroditsky to Board of Directors

There are many different aspects and responsibilities that come with the title “CEO.” Running a company presents its…

Emiliano portrait
Emiliano Berenbaum | June 13, 2023
Trustle Takeaways: RSA Conference 2023

We can’t be the only ones that still revel in attending events live and in person. Being at the 2023 RSA Conference in…

Josh portrait
Josh Lange - Chief Revenue Officer | May 31, 2023
The complexity of creating a visual language that needs to be invisible

There’s a field for UX/UI designers that often goes overlooked and underappreciated, from the external view. That has…

Sabrina portrait
Sabrina Signorelli - UX / UI Designer | May 09, 2023
Takes from Trustle: Cracking Down on Access Management

Sadly, data leak incidents have become commonplace. Events which were once rarely heard about or discussed, are now…

Geremy Cohen
Geremy Cohen | April 25, 2023
The Importance of Logo and Branding

Branding is critical for any business, but it is especially important for security products. In today's digital age…

Ian portrait
Ian Shaw - UX/UI Designer and Branding Specialist | April 07, 2023
Trustle Raises $6M Seed Round to Revolutionize Access Management

California-based startup looks to secure the cloud environment by expanding the development of its cloud native access…

Dana portrait
Dana Segan - LaunchTech Communications | April 03, 2023
Announcing Trustle Support for Tableau: Manage Temporary and Just-in-Time Access to Data

Tableau is a powerful business intelligence and data visualization tool that allows users to explore and analyze their…

Georgina portrait
Georgina Olivieri | March 15, 2023
How Cloud Platform Provisioning Differs from Personal Productivity Enablement

Although they are similar conceptually, provisioning cloud platforms differs significantly from enabling personal…

Mike portrait
Mike Neuenschwander | February 14, 2023
Re-thinking the data model in a cloud world: toward a practical approach to securing the cloud

Identity Management has come a long way in the 30 years or so since its infancy. Quite a lot of investment has gone into…

Mike portrait
Mike Neuenschwander | January 25, 2023
Managing Access@Risk: Is Zero Trust a Must? New Approaches to Secure Business Enablement

Back in my days as an industry analyst, I was able to meet the identity management and security teams at Nordstrom—very…

Mike portrait
Mike Neuenschwander | November 11, 2022
Trustle > the Sum of IGA Parts

Bring up a novel ideal to an engineer in your organization and the likely response will be, "cool, we could totally…

Mike portrait
Mike Neuenschwander | September 22, 2022
Emiliano, CEO of Trustle, Speaks with FUSE VC about Trustle and Building Successful Companies

Our CEO, Emiliano Berenbaum, is an industry luminary and has a fantastic track record for building early stage startups…

Mike portrait
Mike Neuenschwander | September 13, 2022
Use Case: Cleaning up unused and risky accounts on your cloud platforms

The first step in securing your cloud platforms is to catalog all existing accounts and prune any that are unused or too…

Mike portrait
Mike Neuenschwander | August 12, 2022
Don’t fear the Auditor–a Trustle customer case study

A customer of ours recently informed us that they were performing their annual audits for the “char salad” (my term) of…

Mike portrait
Mike Neuenschwander | July 26, 2022
Access has a lifecycle, too–implementing "permissions while you need them"

A major barrier to implementing a least privilege program is the arduous, manual, and lengthy process of turning access…

Mike portrait
Mike Neuenschwander | July 15, 2022
Identity management was the best we could do at the time

I’ve been involved in this industry long enough to remember how identity management became indispensable to access…

Mike portrait
Mike Neuenschwander | June 27, 2022
The evolution of work in a DevSecOps world

Compared to just a few long years ago (that is to say, pre-pandemic) dev teams have grown irreversibly distributed…

Mike portrait
Mike Neuenschwander | June 23, 2022
Why Single Sign-On Isn’t Enough

Single sign on has it's place but leaves a lot of IAM un-managed. Learn where it's strong, and where it's weak.

Jon portrait
Jon Debonis | October 14, 2021
Google Data Leak Highlights the Dangers of Traditional Role-based Access Controls

Between 2018 and 2020, Google fired dozens of employees for misusing access to the company's tools or data, according to an internal company document obtained by VICE Motherboard. The document also reveals that Google fired 36 employees in 2020 for security violations, including allegations of mishandling confidential data.

Jon portrait
Jon Debonis | October 01, 2021
Fast, Easy Entitlement Management for Developer Teams

Development work can hit a roadblock when developers don’t have access to the resources they need. Trustle gets access quickly and reduces security risk.

Jon portrait
Jon Debonis | September 13, 2021