At-rest encryption. Use SFTP log-in credentials to unlock/decrypt encrypted drive or folder on an Ubuntu Linux server

I have a simple file server running on a small Ubuntu machine that facilitates file sharing and 2 way folder syncing between my and my girlfriend’s 4 computers through SFTP over a private network.
The setup works great for this purpose. I … Continue reading At-rest encryption. Use SFTP log-in credentials to unlock/decrypt encrypted drive or folder on an Ubuntu Linux server

Using Vendor Management to Defend Against Supply Chain Attacks

Supply chain attacks are growing more common. According to the Identity Theft Resource Center (ITRC), there were just 19 supply chain attacks in the final quarter of 2020. In the following quarter, that volume grew to 27 attacks — an increase of 42%. Those incidents in Q1 2021 affected 137 U.S. groups and a total […]

The post Using Vendor Management to Defend Against Supply Chain Attacks appeared first on Security Intelligence.

Continue reading Using Vendor Management to Defend Against Supply Chain Attacks

6 Benefits of Using Privileged Access Management

When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other aspects to consider as well. Using the full spectrum offered by Privileged Access Management (PAM) can help. It’s easy to focus on the glitzier sides […]

The post 6 Benefits of Using Privileged Access Management appeared first on Security Intelligence.

Continue reading 6 Benefits of Using Privileged Access Management

Building Blocks: How to Create a Privileged Access Management (PAM) Strategy

Privileged access management (PAM) has long been central to a good enterprise cybersecurity strategy. However, its nature is changing. The pace of digital change is speeding up and reliance on the cloud increasing. So, businesses and agencies must develop new PAM strategies to keep up. Processes and tools that could support yesterday’s on-premises IT rarely […]

The post Building Blocks: How to Create a Privileged Access Management (PAM) Strategy appeared first on Security Intelligence.

Continue reading Building Blocks: How to Create a Privileged Access Management (PAM) Strategy

Why Privileged Access Management Is So Hard in the Cloud

Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM. In a July 2019 study cited by Forbes, for instance, just 1% of respondents said that they don’t use any kind of PAM. More than eight of 10 of those respondents were happy […]

The post Why Privileged Access Management Is So Hard in the Cloud appeared first on Security Intelligence.

Continue reading Why Privileged Access Management Is So Hard in the Cloud

Por que ManageEngine PAM360 é a solução definitiva de gerenciamento de acesso privilegiado

Na ManageEngine, estamos desenvolvendo um dos pacotes de software de gerenciamento de TI mais abrangentes e totalmente integrados do mercado. Temos mais de 90 produtos e ferramentas gratuitas para gerenciar todas as suas necessidades de TI, incluindo g… Continue reading Por que ManageEngine PAM360 é a solução definitiva de gerenciamento de acesso privilegiado

How good/bad are these transparent Linux consumer FDE setup options? (e.g. for auto-unlocking LUKS)

UPDATED Summary: I’m looking at Linux FDE options that are transparent to the user (my parents) in that the user doesn’t need to enter 2 passwords. I found/thought of several options and tried to think through the security implications of … Continue reading How good/bad are these transparent Linux consumer FDE setup options? (e.g. for auto-unlocking LUKS)

Cuatro pilares de gestión de cuentas privilegiadas (PAM), según Gartner

La gestión de cuentas privilegiadas depende de muchas cosas más allá de las herramientas PAM, es indispensable tener en cuenta aspectos como la auditoría, el control, la gobernanza y una adecuada administración de las tareas automatizadas. Conozca aqu… Continue reading Cuatro pilares de gestión de cuentas privilegiadas (PAM), según Gartner

Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Editor’s Note: This is part three of a blog series on securing privileged access and identities in the cloud. Part 1: Five Best Practices for Securing Privileged Access and Identities for the Cloud Management Console Part…
The post Secure Your Cloud … Continue reading Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps