Why You Need PAM and VPAM in 2020

As IT and security managers begin to organize and submit their 2020 budget requests, privileged access management (PAM) or vendor privileged access management (VPAM) may be on the list of competing priorities. PAM is a more sophisticated way to handle… Continue reading Why You Need PAM and VPAM in 2020

Lowering the Barrier to Privileged Access Management with Devolutions


At Ignite 2019, we sat down with Devolutions to learn what’s new with their solutions and how they are lowering the entry barrier for SMBs who are looking for a PAM solution.

The post Lowering the Barrier to Privileged Access Management with Devolutions appeared first on Petri.

Continue reading Lowering the Barrier to Privileged Access Management with Devolutions

Time Is Money—Poor PAM Can Cost You Both

Most cyberattacks use valid credentials one way or another. Whether it’s an actual insider attack from a disgruntled employee or an external attack using hacked or stolen credentials, at the point of access to sensitive systems or data, the attack app… Continue reading Time Is Money—Poor PAM Can Cost You Both

Why PAM Should Be a CISO’s Top Priority

Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an … Continue reading Why PAM Should Be a CISO’s Top Priority

Security News: October 1, 2019 – HNN #236

Security News: October 1, 2019
The post Security News: October 1, 2019 – HNN #236 appeared first on Security Weekly. Continue reading Security News: October 1, 2019 – HNN #236

Challenges and Pitfalls of Privileged Access Management

It’s a reality of the threat landscape today that most attacks rely on or exploit privileged access management in some way. A recent report claims that 95% of breaches could have been prevented—and many of those are the result of abusing or exploiting… Continue reading Challenges and Pitfalls of Privileged Access Management

Overcoming Hurdles to Implementing PAM

Regardless of the type of attack, a majority of cyber attacks take advantage of weaknesses in access management in order to exploit privileged access in some way. Privileged access management (PAM) is a crucial element of effective cybersecurity, but a… Continue reading Overcoming Hurdles to Implementing PAM