The Blurring Line Between Privileged and Non-Privileged Users

“Identity truly  is the new perimeter” was one of the big topics  at Impact Live. This is because  organizations are dealing with a new set of operational and security challenges related to introducing more endpoints…
The p… Continue reading The Blurring Line Between Privileged and Non-Privileged Users

Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

Every year, the security industry at large eagerly awaits the release of the Verizon Data Breach Investigations Report (DBIR). Now in its thirteenth year, the DBIR is widely considered to be one of the industry’s…
The post Verizon DBIR 2020: Cr… Continue reading Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

Native, Interactive Login Aids Privileged Session Management

We recently explored how native session management can help organizations secure workflows and protect privileged access while giving users the flexibility to work with their favorite applications and tools. As companies search for tools that…
The po… Continue reading Native, Interactive Login Aids Privileged Session Management

Office Exodus Drives Endpoint (In)Security

Around the globe, the rapid, unplanned shift to remote work has tested CISOs’ ability to get employees up and running quickly and demonstrate decisive leadership in the face of uncertainty. To support workforce productivity and…
The post Office… Continue reading Office Exodus Drives Endpoint (In)Security

Office Exodus Drives Endpoint (In)Security

Around the globe, the rapid, unplanned shift to remote work has tested CISOs’ ability to get employees up and running quickly and demonstrate decisive leadership in the face of uncertainty. To support workforce productivity and…
The post Office… Continue reading Office Exodus Drives Endpoint (In)Security