What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply not the case. In fact, attacks… Continue reading What State-Sponsored Attacks Can Teach Us About Conditional Access

85% of organizations fail to meet even basic PAM security hygiene

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you migh… Continue reading 85% of organizations fail to meet even basic PAM security hygiene

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing. At a recent I… Continue reading Conditional Access Establishes Trust In the Network

Privileged credential abuse is involved in 74% of data breaches

Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost three out of every four breaches, according to Centrify. The survey of 1,000 IT d… Continue reading Privileged credential abuse is involved in 74% of data breaches

Making Privileged Access Management Complete: Find the JIM to your PAM

You read that right. In a shameless reference to the Office, I want to be the JIM to your PAM. Jim and Pam’s relationship was undeniable from the start: both of them had a mutual understanding and fit. While they constantly denied their rela… Continue reading Making Privileged Access Management Complete: Find the JIM to your PAM

Is Privileged Access Management still a pain?

Every week seems to bring the story of a new customer data breach, but regardless of the individual details, the majority of incidents have one trait in common. The chances are high that the breach was made possible through the compromise of privileged… Continue reading Is Privileged Access Management still a pain?

Privileged account practices are poor, and IT security teams know it

One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged access management (PAM) security disciplines, likely exposing organizations to d… Continue reading Privileged account practices are poor, and IT security teams know it

Privileged account practices are poor, and IT security teams know it

One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged access management (PAM) security disciplines, likely exposing organizations to d… Continue reading Privileged account practices are poor, and IT security teams know it

How companies continue to expose sensitive data to threats

A new study from the Varonis Data Lab found that on average, 21% of a company’s folders were accessible to every employee, and 41% of companies had at least 1,000 sensitive files open to all employees. The report, based on analysis of data risk assessm… Continue reading How companies continue to expose sensitive data to threats