Quantcast
Channel: privileged account management – Identity Week
Browsing latest articles
Browse All 13 View Live

Defending Against Nation-State Cyber Attacks

If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen...

View Article



How Are Today’s IT Professionals Managing Privileged Accounts?

To gain a better understanding of what IT shops are doing to get a grip on their powerful privileged accounts, we polled attendees of the recent Microsoft TechEd 2013 Conference. We asked - “What has...

View Article

The Race Is On for Securing Critical National Infrastructure

Over the last year my company has been working on managing ever larger customer environments including some that require taking our auto-discovery of privileged accounts to the “next level”....

View Article

University Medical Center Hamburg-Eppendorf Scores European Identity Award

Congratulations to our customer University Medical Center Hamburg-Eppendorf (UKE), who was named a winner of the European Identity & Cloud Awards 2013 for Best Approach on Improving Governance and...

View Article

A Case Study in Privileged Credential Management

What does a customer of privileged credential management technology look like? What problems is he trying to solve and why? We thought we’d answer those questions from the perspective of one of our...

View Article


Data Security – Is Some Information Too Sensitive to Trust to Computers?

After incursions into Target, Home Depot, JP Morgan, Sony Pictures and others, I’ve been asked if it’s now reached the point where some information is simply too sensitive to entrust to computers. My...

View Article

Privilege Management Explained

Advanced cyber attacks require automated security solutions that can locate and remediate weaknesses faster than nation-state attackers and criminal hackers can exploit them. The post Privilege...

View Article

Privileged Accounts, User Accounts and the Cyber Security Challenge

Essentially, the challenge for IT is having a good source of privileged account information that is continuously up to date. And they must combine that information with domain specific knowledge about...

View Article


The Static Administrator Password Problem

In many of the IT shops I’ve seen, all the systems have the same administrator account name and the same basic password. And, in most of these cases, this password has not been changed since the...

View Article


The Role of Cyber Security in Mergers and Acquisitions

When two corporate IT environments come together, IT administrators come face to face with one of the biggest IT challenges of a successful merger: privileged identity management. The post The Role of...

View Article
Browsing latest articles
Browse All 13 View Live




Latest Images