Different IoT Breach, Same (In)Security Story, Broader Consequences

“I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 when “Somebody’s Watching Me” topped the charts, but today it’s real life: somebody…
The post Different IoT Breach, Same (In)Security Story, Bro… Continue reading Different IoT Breach, Same (In)Security Story, Broader Consequences

Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections. We’ve…
The post Three Best Practices to Get Privileged … Continue reading Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections. We’ve…
The post Three Best Practices to Get Privileged … Continue reading Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

A Step in the Right Direction: The IoT Cybersecurity Improvement Act

A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital business transformation. Experts project that by…
The post A Step in … Continue reading A Step in the Right Direction: The IoT Cybersecurity Improvement Act

Healthcare’s Third-Party Privileged Access Problem Is Now a State of Emergency

A technology disruption in a hospital operating room or an emergency response chain can spell the difference between life and death. Yet as healthcare providers, medical R&D and pharmaceutical companies around the world work to…
The post Healthca… Continue reading Healthcare’s Third-Party Privileged Access Problem Is Now a State of Emergency

Enable New Ways of Work: Simplified Remote User Privileged Access with SaaS

Organizations everywhere are undertaking major digital transformation initiatives. Whether moving critical resources to the cloud, or investing in greater automation capabilities, COVID-19 has dramatically accelerated these efforts to quickly enable re… Continue reading Enable New Ways of Work: Simplified Remote User Privileged Access with SaaS

Time to Re-examine Remote Access After VPN Password Leak

Just days ago, a list of plaintext usernames, passwords and IP addresses for more than 900 Pulse Secure VPN servers was published online along with SSH keys for each server, a list of all local…
The post Time to Re-examine Remote Access After VPN Pas… Continue reading Time to Re-examine Remote Access After VPN Password Leak

7 Best Practices for Securely Enabling Remote Work

At Impact Live 2020 we spent a lot of time discussing strategies for maintaining a strong cybersecurity posture in the age of remote work. Today’s users need flexibility to do their jobs efficiently with the…
The post 7 Best Practices for Secur… Continue reading 7 Best Practices for Securely Enabling Remote Work

Security for the Modern OT Environment

Operational Technology (OT) – the hardware and software that’s used to monitor, detect and control changes to devices, processors and events of industrial equipment are popular targets for cyber attackers…and for good reason. Unauthor… Continue reading Security for the Modern OT Environment

PAM as a Service: It’s All a Matter of Trust

With shifting priorities and dynamic technology environments, IT security teams are looking for ways to cover the most ground while draining as few resources as possible. Privileged access management (PAM) continues to be a priority…
The post PAM as … Continue reading PAM as a Service: It’s All a Matter of Trust