November 9, 2017 Privileged Account Management Remains Problematic 2 min read - Companies that neglect basic security best practices are grappling with problems related to privileged account management, according to a recent survey.
Identity & Access November 7, 2017 Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass 3 min read - Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.
Energy & Utility October 30, 2017 Addressing the Clear and Present Danger of an Electrical Power Grid Breach 4 min read - Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
October 20, 2017 Security Vulnerability Puts Linux Kernel at Risk 2 min read - A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
Identity & Access September 19, 2017 Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey 6 min read - Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.
Risk Management September 8, 2017 Risk Governance: The True Secret Weapon of Cybersecurity 2 min read - While security solutions can certainly help organizations fight ransomware and other threats, the best defense is a robust risk governance strategy.
Identity & Access July 25, 2017 Administrator Credentials: A Security Breach Waiting to Happen 2 min read - If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.
Identity & Access March 9, 2017 Five Steps to Propel Your Privileged Identity Management Strategy to the Next Level 2 min read - Privileged accounts are among the juiciest targets for fraudsters. Follow these five simple steps to become a privileged identity management pro.
Identity & Access March 3, 2017 Abuse of Privileges: Common Barriers to Managing Privileged Accounts 2 min read - Companies often face challenges related to shared IDs, third-party access, regulatory compliance and privilege creep when managing privileged accounts.
Endpoint February 3, 2017 The Zero Trust Model for Living in a Hacked World 3 min read - The zero trust model requires IT managers to abandon the "trust but verify" concept and manage user access according to a strategy of least privilege.