dcsimg

Key Takeaways from the 2019 Verizon Data Breach Investigations Report

The Verizon Data Breach Investigations Report 2019 is now publicly available to download or read online. It’s the 12th edition, and not surprisingly, it reveals that cyber criminals are still successfully using their hacking techniques—many of which are very common—and that we have failed to stop them. However, we are getting better at stopping them. MORE THAN 40K SECURITY INCIDENTS, AND OVER 2K … [Read more...]

How to Remove Admin Rights Without Reducing Productivity

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the first place, and why remove … [Read more...]

The Evolution from Password Managers to Privileged Access Management. Which is right for you?

In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to authorize approved employees and 3rd party contractors’ access to the systems and applications required to perform their jobs. As companies move to the cloud, the already-challenging task of providing common and secure access and satisfying stronger … [Read more...]

The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they are also the accounts most … [Read more...]

Cyber Security Incident Response and Reporting Process

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information on incident response. Mangools.com—a … [Read more...]

Joseph Carson’s Top 5 Sessions to Attend at RSA Conference 2019

RSA Conference 2019 will take place March 4th – 8th in San Francisco at the Moscone Center.  The theme this year is ‘Better’. Not exactly a warm, exciting theme for security professionals—it implies that we need to do better and work harder. My mind always tells me to work smarter and stay focused.  But there’s no question that we do need to do better with cyber security. Cyber-attacks are … [Read more...]

Actions CISOs Must Take to Overcome Negative Perceptions

Chief Information Security Officers (CISOs) shoulder tremendous responsibility. They’re ultimately responsible for their company’s cyber security posture. At the same time, the security decisions they make also impact core business metrics such as productivity, cost savings, revenue growth, and brand perception. The world of today’s CISOs is a balancing act. On one hand, they are “enforcers” of … [Read more...]

How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

As awareness about the importance of Privileged Access Management (PAM) and Privileged Identity Management (PIM) increases, (Gartner called it a top priority for cyber security in 2019), executives, IT security and operations teams are evaluating multiple options when selecting a PAM or PIM solution that would be best for their organizations. That means independent analysis becomes very important … [Read more...]

Up, up and to the Clouds: Cloud Computing 101

The cloud has always been this mysterious place—many companies embraced it and put everything they could into the cloud, while others watched cautiously from a distance, wondering whether they should do the same. Before taking you on the journey to the cloud, let’s answer the question “What is the cloud, exactly?” Clearly, it’s been a source of confusion. In fact, many still point up when they use … [Read more...]

How to kick start your least privilege strategy as we begin 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised accounts, organizations increasingly recognize how … [Read more...]