Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.

The post Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques appeared first on Security Intelligence.

Continue reading Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach

Fraudsters are after more than just passwords, and protecting user credentials is more crucial than ever amid the increasingly advanced threat landscape.

The post In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach appeared first on Security Intelligence.

Continue reading In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach

Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.

The post Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager appeared first on Security Intelligence.

Continue reading Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.

The post Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager appeared first on Security Intelligence.

Continue reading Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

Secure Your Business Silently With Unified Identity and Access Management

Unified identity and access management solutions from IBM enable security teams to silently protect their networks without disrupting the user experience.

The post Secure Your Business Silently With Unified Identity and Access Management appeared first on Security Intelligence.

Continue reading Secure Your Business Silently With Unified Identity and Access Management

Teaming Up to Overhaul Authentication

IBM is partnering with leading authentication providers to make it easier to integrate new authentication technologies with IBM Security Access Manager.

The post Teaming Up to Overhaul Authentication appeared first on Security Intelligence.

Continue reading Teaming Up to Overhaul Authentication

Let Silent Security Drive Your Identity and Access Management

IBM Identity and Access Management (IAM) solutions deliver silent security, which enables analysts to protect your identity by monitoring behavioral data.

The post Let Silent Security Drive Your Identity and Access Management appeared first on Security Intelligence.

Continue reading Let Silent Security Drive Your Identity and Access Management

Improving Decision-Making in User Access Review and Cleanup Projects

Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.

The post Improving Decision-Making in User Access Review and Cleanup Projects appeared first on Security Intelligence.

Continue reading Improving Decision-Making in User Access Review and Cleanup Projects

What to Know About the 2017 Gartner IAM Summit

Looking forward to this year’s Gartner IAM Summit in Las Vegas? Here’s what you need to know to make the most of this conference.

The post What to Know About the 2017 Gartner IAM Summit appeared first on Security Intelligence.

Continue reading What to Know About the 2017 Gartner IAM Summit

Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass

Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.

The post Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass appeared first on Security Intelligence.

Continue reading Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass