Goodbyes are difficult, IT offboarding processes make them harder

When employees, contractors and service providers leave an organization, they take with them knowledge, capabilities, and professional achievements. They should leave behind any proprietary or confidential data belonging to the organization, but Osterm… Continue reading Goodbyes are difficult, IT offboarding processes make them harder

Benefits of modern PAM: Efficiency, security, compliance

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward the human administrator or designed for the data center, making them inadequat… Continue reading Benefits of modern PAM: Efficiency, security, compliance

How to prevent permission bloat: Overlooked and hidden access

When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization can face – and it’s less of a stone and more of a somehow-overlooked, but ever-… Continue reading How to prevent permission bloat: Overlooked and hidden access

Exploring the risky behavior of IT security professionals

Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs. Meanwhile, nearly 40% of respondents who experienced bad performance r… Continue reading Exploring the risky behavior of IT security professionals

Managing and monitoring privileged access to cloud ecosystems

Cloud data breaches are on the rise, demonstrating time and again the need for a different approach and strategy when it comes to managing and monitoring privileged access to cloud ecosystems. Privilege access management (PAM) should: Be risk-aware and… Continue reading Managing and monitoring privileged access to cloud ecosystems

Attackers are exploiting vulnerable WP plugins to backdoor sites

A group of attackers that has been injecting WordPress-based sites with a script redirecting visitors to malicious and fraudulent pages has now also started backdooring the vulnerable installations, Wordfence’s Mikey Veenstra warns. The attacks T… Continue reading Attackers are exploiting vulnerable WP plugins to backdoor sites

Red Flag Alert: Service Accounts Performing Interactive Logins

In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. 
On the contrary, we at Preempt see something that happens just as frequently: failing to limit exposed and vulnerable service a… Continue reading Red Flag Alert: Service Accounts Performing Interactive Logins

Protecting your organization against privileged identity theft

What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the credentials of users with access to privileged accounts – such as administrati… Continue reading Protecting your organization against privileged identity theft

How privileged insiders threaten the security of global organizations

A new global survey from BeyondTrust explores the visibility, control, and management that IT organizations in the U.S., APAC, Europe and the Middle East have over employees, contractors, and third-party vendors with privileged access to their IT netwo… Continue reading How privileged insiders threaten the security of global organizations

Security overconfidence and immaturity continue to endanger organizations

The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. Seventy-nine percent of organizations do not have a mature approach to Privi… Continue reading Security overconfidence and immaturity continue to endanger organizations