Defending Against Nation-State Cyber Attacks
If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen...
View ArticleHow Are Today’s IT Professionals Managing Privileged Accounts?
To gain a better understanding of what IT shops are doing to get a grip on their powerful privileged accounts, we polled attendees of the recent Microsoft TechEd 2013 Conference. We asked - “What has...
View ArticleThe Race Is On for Securing Critical National Infrastructure
Over the last year my company has been working on managing ever larger customer environments including some that require taking our auto-discovery of privileged accounts to the “next level”....
View ArticleUniversity Medical Center Hamburg-Eppendorf Scores European Identity Award
Congratulations to our customer University Medical Center Hamburg-Eppendorf (UKE), who was named a winner of the European Identity & Cloud Awards 2013 for Best Approach on Improving Governance and...
View ArticleA Case Study in Privileged Credential Management
What does a customer of privileged credential management technology look like? What problems is he trying to solve and why? We thought we’d answer those questions from the perspective of one of our...
View ArticleData Security – Is Some Information Too Sensitive to Trust to Computers?
After incursions into Target, Home Depot, JP Morgan, Sony Pictures and others, I’ve been asked if it’s now reached the point where some information is simply too sensitive to entrust to computers. My...
View ArticlePrivilege Management Explained
Advanced cyber attacks require automated security solutions that can locate and remediate weaknesses faster than nation-state attackers and criminal hackers can exploit them. The post Privilege...
View ArticlePrivileged Accounts, User Accounts and the Cyber Security Challenge
Essentially, the challenge for IT is having a good source of privileged account information that is continuously up to date. And they must combine that information with domain specific knowledge about...
View ArticleThe Static Administrator Password Problem
In many of the IT shops I’ve seen, all the systems have the same administrator account name and the same basic password. And, in most of these cases, this password has not been changed since the...
View ArticleThe Role of Cyber Security in Mergers and Acquisitions
When two corporate IT environments come together, IT administrators come face to face with one of the biggest IT challenges of a successful merger: privileged identity management. The post The Role of...
View Article
More Pages to Explore .....