It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic shift, this push…
The post It’s I… Continue reading It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked inside that…
The post Hard-Coded Credentials: The Not-So-Se… Continue reading Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations face in securing their applications across the software dev… Continue reading Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

Into The Matrix: Defense Contractor Takes the Red Pill to Accelerate Network Automation

Our modern world is built on vast interconnected systems of network devices. Within an organization, networks keep everyone and everything connected and up and running. To maintain a strong cybersecurity posture, network infrastructure must reflect…
Continue reading Into The Matrix: Defense Contractor Takes the Red Pill to Accelerate Network Automation

Ramp Up Container Security With Red Hat OpenShift and CyberArk

Microservices and containerized approaches are becoming increasingly critical elements of digital transformation strategies. Container platforms offer developers and operations teams a simplified way to build and deploy better applications faster acros… Continue reading Ramp Up Container Security With Red Hat OpenShift and CyberArk

Securely Automate IT Tasks with Ansible and CyberArk

Over the past few years, IT teams have embraced automation as a powerful tool to eliminate repetitive tasks, improve efficiency and consistency, and boost productivity and collaboration. The business realities of 2020 are propelling a…
The post Secur… Continue reading Securely Automate IT Tasks with Ansible and CyberArk

Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Cyber attackers are hitting organizations from every angle — and, increasingly, from inside. According to a 2020 Ponemon Institute study, the frequency of insider threat incidents spiked by 47% since 2018 and the average annual…
The post Prehistoric … Continue reading Prehistoric Security Controls: Deconstructing the Jurassic Park Insider Threat Incident

Making Azure Cloud Environments Even More Secure with CyberArk

A recent survey of technology executives at large firms showed that Microsoft Azure continues to be the most popular provider of public cloud services, even as Amazon leads the market overall in terms of revenue…
The post Making Azure Cloud Environme… Continue reading Making Azure Cloud Environments Even More Secure with CyberArk

Source Code Leak Lesson: Secure Development Environments

Once again we are seeing how vulnerable and easily development environments can be exploited with the recent news of a massive trove of leaked code from 50+ enterprises across multiple industries, including tech, finance, retail,…
The post Source Cod… Continue reading Source Code Leak Lesson: Secure Development Environments

The Blurring Line Between Privileged and Non-Privileged Users

“Identity truly  is the new perimeter” was one of the big topics  at Impact Live. This is because  organizations are dealing with a new set of operational and security challenges related to introducing more endpoints…
The p… Continue reading The Blurring Line Between Privileged and Non-Privileged Users