dcsimg

Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the strictest uptime … [Read more...]

Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

CISOs and their security teams have an impossible task; they must predict the most urgent threats posed to their organizations, then prioritize investments in technology solutions to defend against those threats. While it’s impossible for any organization to defend against every conceivable type of cyberattack, understanding basic threat vectors and vulnerabilities is critical, and the time to … [Read more...]

Service Account Governance: Reduce your attack surface with Account Lifecycle Manager

Service accounts abound in every organization. Failure to manage them leads to significant risk. This has been a critical issue for organizations that use Active Directory and have grown to a level that accounts can no longer be managed by hand. Almost all medium to large organizations suffer from extreme service account sprawl, perpetuating the unmanaged, uncontrolled expansion of their … [Read more...]

Building a PAM business case: cost-justifying privileged access management projects

Most IT or security projects require a formal approval process, and that often includes a written business case. An IT business case document can vary from a simple one-page write-up to a full-blown justification paper with detailed cost and return-on-investment calculations. Many organizations have standard business case templates, but here’s what type of information a business case generally … [Read more...]

Top 5 Black Hat 2019 Sessions Not to Miss. Plus: Bonus Travel Tips to Hacker Cons

The Black Hat USA 2019 conference is about to start. Over 17,000 security professionals will come from all around the world to Las Vegas, USA. They will learn, share, educate and disclose security research on the latest cyber-threats and attacks, vulnerabilities, and techniques used to bypass security used by most governments and organizations globally. Without clear collaboration and … [Read more...]

Cloud Use Cases: Critical PAM controls to secure a modern cloud environment

Virtually all cloud security failures will be the customers’ fault. That’s what Gartner believes the future of cloud security for the enterprise will look like within the next four years. More than half of cloud security issues will be caused by inadequate management of identities, access and privileges. “The challenge exists not in the security of the cloud itself, but in the policies and … [Read more...]

You break it, you buy it: Fear of unknown dependencies hinders service account governance

Thousands of services run on a typical corporate network. They include multiple services which are core to network security, network services, and IT automation, such as Windows services, scheduled tasks, batch jobs, application pools within IIS, and more. To connect automatically across a network to databases, file systems, and network services, these services rely on privileged service … [Read more...]

Top 10 Best Cyber Security Podcasts of 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts to keep us informed about the latest security threats, InfoSec tools, and cyber best practices. Below you’ll find our curation of the 10 best cyber … [Read more...]

Protect Your Privileged Credentials with WebAuthn

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report.  This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already compromised. Organizations still struggle with … [Read more...]

Your city does not have to be a victim of ransomware

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations Report, Ransomware remains a major threat … [Read more...]