Is Corporate VPN Security Dead?

Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own.

The post Is Corporate VPN Security Dead? appeared first on Security Intelligence.

Continue reading Is Corporate VPN Security Dead?

A Proposed Solution to the Password Reuse Problem

A group of researchers proposed a new framework that would enable web services to share users’ password hash data in an effort to reduce password reuse.

The post A Proposed Solution to the Password Reuse Problem appeared first on Security Intelligence.

Continue reading A Proposed Solution to the Password Reuse Problem

The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

Human error, credential misuse and disgruntled employees aren’t the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.

The post The Inadvertent Insider Threat: A CISO Confronts a Breach From Within appeared first on Security Intelligence.

Continue reading The Inadvertent Insider Threat: A CISO Confronts a Breach From Within

What Is Next-Generation Privileged Account Management?

Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment — and helps security teams enforce least privilege policies.

The post What Is Next-Generation Privileged Account Management? appeared first on Security Intelligence.

Continue reading What Is Next-Generation Privileged Account Management?

Where Is Your Sensitive Information and Where Is It Going?

To protect sensitive information, security professionals must know exactly where this data resides, who is accessing it, when it is being accessed and whether this activity violates policy.

The post Where Is Your Sensitive Information and Where Is It Going? appeared first on Security Intelligence.

Continue reading Where Is Your Sensitive Information and Where Is It Going?

Don’t Leave Your Keys in the Ignition — Safeguard High-Value Data With Privileged Access Management

For cybercriminals, failing to protect privileged credentials is like leaving the keys in your ignition. Implementing privileged access management is a crucial step toward minimizing cyber risks.

The post Don’t Leave Your Keys in the Ignition — Safeguard High-Value Data With Privileged Access Management appeared first on Security Intelligence.

Continue reading Don’t Leave Your Keys in the Ignition — Safeguard High-Value Data With Privileged Access Management

Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Security analysts can nip many cyberattacks in the bud by monitoring for named pipe impersonation and other activity indicative of privilege escalation.

The post Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques appeared first on Security Intelligence.

Continue reading Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques

Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass

Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.

The post Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass appeared first on Security Intelligence.

Continue reading Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.

The post Addressing the Clear and Present Danger of an Electrical Power Grid Breach appeared first on Security Intelligence.

Continue reading Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey

Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.

The post Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey appeared first on Security Intelligence.

Continue reading Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey