Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in…
The post Attacker Productivity: Exploit Misconfigured Identitie… Continue reading Attacker Productivity: Exploit Misconfigured Identities in the Cloud

Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections. We’ve…
The post Three Best Practices to Get Privileged … Continue reading Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections. We’ve…
The post Three Best Practices to Get Privileged … Continue reading Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

Banking Cybersecurity Vet: Why Transformation Must Start at the Top

The banking industry spends 40% more on combating cybercrime than any other industry, with a per-firm average of $18.5 million spent on direct costs of incidents annually. When you also consider that cyber attacks on…
The post Banking Cybersecurity V… Continue reading Banking Cybersecurity Vet: Why Transformation Must Start at the Top

People, Process and Technology: Six Best Practices for Cloud Least Privilege

If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services…
The post People, Process and Technology: Six Best Pr… Continue reading People, Process and Technology: Six Best Practices for Cloud Least Privilege

Healthcare’s Third-Party Privileged Access Problem Is Now a State of Emergency

A technology disruption in a hospital operating room or an emergency response chain can spell the difference between life and death. Yet as healthcare providers, medical R&D and pharmaceutical companies around the world work to…
The post Healthca… Continue reading Healthcare’s Third-Party Privileged Access Problem Is Now a State of Emergency

A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

The world is changing quickly. Digital transformation initiatives and new services from cloud providers are creating an explosion of identity-based permissions. Through the eyes of an attacker, each cloud identity represents a potential opportunity and… Continue reading A Zero Trust Approach to Protecting Cloud Identities Begins with Least Privilege

Why Desktop MFA is Essential to your Endpoint Security

An employee’s work laptop can be a treasure trove for any malicious actor who can get access to it. Think about it. Many of the apps you use on your laptop don’t ask you for credentials, especially if your organization doesn’t have strong multi-factor…. Continue reading Why Desktop MFA is Essential to your Endpoint Security

Simple Rules for Smart IAM Solutions

Evaluating IAM solutions can be complex. Understanding how to evaluate security analytics is key to making decisions. In this day and age of Machine Learning (ML), analytics systems can become very complex, very quickly. Having…
The post Simple Rules… Continue reading Simple Rules for Smart IAM Solutions