Delinea Privilege Manager enhancements reduce risk of cyber attacks through workstations

Delinea announced new features for Privilege Manager, its solution for managing privileged access on Windows and Mac workstations. Updates in this release include improvements to the native MacOS agent, ensuring that the same authorization controls can… Continue reading Delinea Privilege Manager enhancements reduce risk of cyber attacks through workstations

New infosec products of the week: December 2, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, Datadog, Delinea, Fortinet, LogicGate, Shoreline, and Trend Micro. Delinea unveils granular privilege elevation workflow for on-premise and clou… Continue reading New infosec products of the week: December 2, 2022

Delinea unveils granular privilege elevation workflow for on-premise and cloud servers

Delinea announced the latest release of Cloud Suite, its solution that controls privileged access and authorization for on-premise and cloud servers. A new granular privilege elevation workflow allows users to request elevated privileges to execute spe… Continue reading Delinea unveils granular privilege elevation workflow for on-premise and cloud servers

Delinea DevOps Secrets Vault enhancements reduce the risk of compromised credentials

Delinea announced the latest release of DevOps Secrets Vault, its high-speed vault for DevOps and DevSecOps teams. New enhancements include development support on the most recent Mac computers, and improved secrets management usability through automati… Continue reading Delinea DevOps Secrets Vault enhancements reduce the risk of compromised credentials

Report: Benchmarking security gaps and privileged access

Delinea set out to understand what IT security leaders are doing to reduce the risk of a privileged account or identity-based attack. This report reveals how people close to the process feel about their progress, what obstacles stand in their way, and … Continue reading Report: Benchmarking security gaps and privileged access

How Just-in-Time privilege elevation prevents data breaches and lateral movement

Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile attack on the SolarWinds supply chain, it became clear that the threat actors i… Continue reading How Just-in-Time privilege elevation prevents data breaches and lateral movement

Photos: Black Hat USA 2022

Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Bayside Ballroom Foyer Sophos BlackBerry, Palo Alto Networks, AT&T Cybersecurit… Continue reading Photos: Black Hat USA 2022

Stolen credentials are the most common attack vector companies face

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), treading water (13%), or merely running to keep up (27%), according to a survey by S… Continue reading Stolen credentials are the most common attack vector companies face

84% of organizations experienced an identity-related breach in the past 18 months

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), treading water (13%), or merely running to keep up (27%), according to a survey by S… Continue reading 84% of organizations experienced an identity-related breach in the past 18 months