YouAttest

120 posts

YouAttest banner
YouAttest

YouAttest

@YouAttest

Every enterprise needs to quantify and attest to who has access to their sensitive data - YouAttest solve this problem for all enterprises and consultants

Irvine, CA Katılım Haziran 2019
240 Takip Edilen105 Takipçiler
YouAttest
YouAttest@YouAttest·
Still doing user access reviews with spreadsheets, screenshots, and email chains? There’s a better way. ✅ Automate user access reviews ✅ Eliminate manual evidence collection ✅ Simplify compliance for SOC 2, HIPAA, ISO 27001, PCI, NIST & more YouAttest helps organizations automate identity governance and access reviews without the enterprise complexity or price tag. And there's a multi-tenant version for MSPs & Consultants: youattest.com/solutions/youa… Know Your Identities w/ @YouAttest : youattest.com/contact #MemeFriday #CyberSecurity #IdentityGovernance #IGA #AccessReviews #Compliance #SOC2 #HIPAA #Audit #YouAttest
YouAttest tweet media
English
0
0
0
5
YouAttest
YouAttest@YouAttest·
The ShinyHunters-linked breach involving Canvas parent company Instructure reportedly exposed data tied to nearly 9,000 organizations. Reports indicate the attack may have originated through Canvas “Free-For-Teacher” accounts with weaker verification and lower-friction onboarding. washingtonpost.com/education/2026… Security researchers noted:: attackers could appear as legitimate educators while operating inside shared infrastructure. That’s where identity governance and permission control matter. Strong access governance could have helped by: • Continuously validating who should have access • Detecting orphaned and over-permissioned accounts • Separating low-trust onboarding accounts from sensitive production resources And then… • Rapidly revoking risky access before lateral movement escalated Know your identities w/ @YouAttest: youattest.contact #CyberSecurity #IdentitySecurity #IdentityGovernance #Ransomware #GRC #IGA #YouAttest
English
0
0
0
48
YouAttest
YouAttest@YouAttest·
Access reviews tend to become reactive very quickly. Someone changes roles. A contractor keeps access longer than expected. Permissions get added over time. Old accounts stay active. Then suddenly an audit approaches and teams are trying to piece everything together manually. The challenge is that identity environments are constantly changing. Which means visibility can’t be treated as a once-a-year exercise. Strong identity governance comes from continuously understanding: - who has access - what they can access - and whether that access still makes sense How frequently does your organization review user access today? Learn more: YouAttest.com sales@youattest.com +1 877 452 0496 #YouAttest #IdentityGovernance #CyberSecurity #Compliance
YouAttest tweet media
English
0
0
0
10
YouAttest
YouAttest@YouAttest·
RKON and YouAttest are coming together to discuss how teams can move beyond static access reviews and gain real-time visibility into identity risk. In this session, we’ll cover: 🔹 Identity risk signals that actually matter 🔹 Common gaps hidden inside access reviews 🔹 How continuous identity visibility improves security decisions 🔹 A practical approach to measuring IAM maturity Featuring experts from RKON and YouAttest, plus a live Q&A focused on real-world identity and access management challenges. Register here: linkedin.com/events/7458649… #CyberSecurity #IdentitySecurity #IAM #ZeroTrust #GRC #RiskManagement #IdentityGovernance #RKON
YouAttest tweet media
English
0
0
1
6
YouAttest
YouAttest@YouAttest·
Frameworks aren’t there to slow teams down. They exist to make sure critical things don’t get missed. NIST, ISO 27001, CMMC, CIS different frameworks, same goal: consistent security discipline. What framework does your team rely on most? Learn more at YouAttest.com #CyberSecurity #Compliance
English
0
0
2
12
YouAttest
YouAttest@YouAttest·
Attackers tied to ShinyHunters reportedly accessed data tied to ~9,000 organizations before Instructure negotiated to prevent a public leak. thehackernews.com/2026/05/instru… Reports indicate the attack may have originated through “Free-For-Teacher” accounts that had lower-friction onboarding and weaker institutional verification. During incidents like this, organizations struggle to answer: - Who still has access? - Are all service accounts (NHIs) accounted for? - What should be revoked immediately? That’s where identity governance matters. Know your identities w/ YouAttest: youattest.com/contact If you can’t quickly prove who has access to sensitive systems — and why — you’re already behind in a breach. #CyberSecurity #IdentitySecurity #Ransomware #GRC #IGA #YouAttest
English
0
0
0
58
YouAttest
YouAttest@YouAttest·
Instructure PAID the ransom tied to the massive Canvas breach — and the May 12 “pay-or-leak” deadline appears to have passed without the feared public dump of 275M records. insurancejournal.com/news/national/… The company confirmed it reached an “agreement” with the ShinyHunters extortion group after attackers claimed to steal 3.65TB of data affecting ~9,000 organizations. The real questions every organization should be asking right now: - How did attackers gain persistent access? - Which integrations/tokens were abused? - What should have been revoked immediately? - Could your org answer those questions in hours… not weeks? #CyberSecurity #Ransomware #IdentitySecurity #GRC #Canvas #Instructure #ShinyHunters #CyberRisk #HigherEd
English
0
0
0
68
YouAttest
YouAttest@YouAttest·
NSA and CISA just sent a clear message: 🔐 Agentic AI security starts with identity governance. As AI agents gain access to systems, workflows, and sensitive data, organizations must govern them like any other privileged identity. That means: - Least privilege - Access reviews - Visibility into non-human identities AI security is quickly becoming identity security. Read more: youattest.com/blog/nsa-cisas… Know your identities w/ YouAttest: youattest.com/contact #Cybersecurity #AI #IdentityGovernance #AgenticAI #YouAttest
English
0
0
0
16
YouAttest
YouAttest@YouAttest·
@YouAttest for Identity Security: Additional reporting over the last 48–72 hours continues reinforcing that the Canvas/ShinyHunters incident was likely far more than a simple outage. cyberguy.com/security/schoo… Credible reporting and technical advisories now point toward: - repeated compromise activity after remediation began token and credential rotation efforts - and operational concerns tied to SaaS trust/control planes. One of the more important emerging lessons - “System restored” does NOT necessarily mean: - persistence removed - trust relationships reviewed - tokens invalidated - or privileged access paths fully audited. That distinction matters. This story still appears to be evolving. Stay tuned. Know your identities w/ @YouAttest : youattest.com/contact #IdentityAccess #GRC #SBOM #Access #CyberSecurity
English
0
0
0
46