Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. 
On the contrary, we at Preempt see something that happens just as frequently: failing to limit exposed and vulnerable service a… Continue reading Red Flag Alert: Service Accounts Performing Interactive Logins

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security incidents. With more and more data feeds into your security analytics products, … Continue reading Empowering Employees to Reduce Security Incidents

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply not the case. In fact, attacks… Continue reading What State-Sponsored Attacks Can Teach Us About Conditional Access

How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

In the past year, we have seen numerous publicly traded corporations (Marriott and T-Mobile), airlines (Cathay Pacific and Delta), and tech companies (Facebook and Google+) all breached because of some type of insider threat or compromised credent… Continue reading How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent I… Continue reading Conditional Access Establishes Trust In the Network

Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

UPDATE (Jan. 25): Recent news reports state a deal has been reached to re-open the federal government through Feb 15. The issues outlined in this blog continue to apply to public and private sector organizations.
As many of you may have read … Continue reading Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

With ⅓ of Enterprises Suffering from Weak or Exposed Passwords, Is Hollywood Part of the Problem?

What password would you use for a bank account soon to be worth $120 million?
The post With ⅓ of Enterprises Suffering from Weak or Exposed Passwords, Is Hollywood Part of the Problem? appeared first on Security Boulevard.
Continue reading With ⅓ of Enterprises Suffering from Weak or Exposed Passwords, Is Hollywood Part of the Problem?

6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

Most of us still dream practical, down to earth, old fashioned dreams. And I’d place a bet that not many people, if any, dream about their credentials being stolen.  Almost all of my memories from the last 15 years or so are stored digi… Continue reading 6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season