dcsimg

Remote Worker Security: The Risks, Challenges, and Solutions

The concept of working remotely, or granting remote access, isn’t anything new for most IT professionals. Most organizations have embraced a remote workforce, be it their own employees, contractors, consumers, business partners, and managed service providers. What does “working remotely” mean today? For IT professionals, remote access had been thought of as performing your job … [Read more...]

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT department, but the … [Read more...]

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just a technology challenge. It’s a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work and personal life are no longer separate—they have been … [Read more...]

Bring to Light the Security Risks of Web Applications run by Shadow IT

A quiet proliferation of SaaS and web applications and infrastructure with web-based interfaces is taking place throughout your organization. These applications are often essential to business, financial, and technical users. Yet, security and operations folks who are tasked with safeguarding your entire IT environment are likely unaware of the breadth of applications in use. Even when they are … [Read more...]

Role-Based Access Control for a Complex Enterprise

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply them as appropriate. A core tenet of RBAC is to preemptively set rules which apply to all users, rather than making on-the-fly decisions about who should be able to access what. It … [Read more...]

PAM cloud security is different. Let me explain why

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019 With credentials as the overwhelmingly preferred attack … [Read more...]

Just-in-Time Privileged Access Eliminates the Danger of Standing Privileges

Granting users standing access to privileged resources violates the principle of least privilege and introduces significant risk. With undifferentiated access, users can (and do) take unauthorized actions because they’re given TOTAL control of a resource. They could give a password to another person, who could then access a resource without appearing in an audit trail. They could access critical … [Read more...]

Application Control Strategies Help You Prepare for the Unknown

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create whitelists, blacklists, and greylists. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be … [Read more...]

5 Most Popular Password Cracking Tools: Protect Your Enterprise

Passwords. How on earth did we get here?  They’ve been around for so many years and yet there’s still so much to be said about them. In most organizations passwords are what make the difference between keeping cyber criminals out—and falling victim to a cyber-attack. And for the multitude of applications, systems and infrastructure of so many organizations, the only security control … [Read more...]