Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. 
On the contrary, we at Preempt see something that happens just as frequently: failing to limit exposed and vulnerable service a… Continue reading Red Flag Alert: Service Accounts Performing Interactive Logins

What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!

Preempt is happy to release version 3.1, available today! Included in the release are a brand new security assessment dashboard, exciting features offering more visibility and better password and network security, new technology partners and produ… Continue reading What’s New in 3.1? New Dashboard, Exciting Integrations, and A Free Product!

Security Weekly Interview: Securing Identity With Conditional Access

Organizations often have incomplete views of who is accessing what, when, where and how across multiple applications and systems. Understanding a user and their behavior is critical to understanding corporate security risk. In an interview in&#160… Continue reading Security Weekly Interview: Securing Identity With Conditional Access

Ping + Preempt: Securing All Access In Hybrid Cloud Environments

Enterprises struggle to understand what is truly going on in their organization: what their users are doing and how to stop risky activity. Add in the complexity of a hybrid cloud environment, multiple legacy systems, unmanaged endpoints, and unsa… Continue reading Ping + Preempt: Securing All Access In Hybrid Cloud Environments

M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

Enterprises are often forced to implement multiple moving parts as the traditional network perimeter is no longer sufficient to protect against modern threats. These disjointed security solutions rarely talk to each other, causing security silos a… Continue reading M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

UPDATE (Jan. 25): Recent news reports state a deal has been reached to re-open the federal government through Feb 15. The issues outlined in this blog continue to apply to public and private sector organizations.
As many of you may have read … Continue reading Three Ways to Limit the Cybersecurity Impact of the Government Shutdown