Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

Every year, the security industry at large eagerly awaits the release of the Verizon Data Breach Investigations Report (DBIR). Now in its thirteenth year, the DBIR is widely considered to be one of the industry’s…
The post Verizon DBIR 2020: Cr… Continue reading Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

PAM as a Service: It’s All a Matter of Trust

With shifting priorities and dynamic technology environments, IT security teams are looking for ways to cover the most ground while draining as few resources as possible. Privileged access management (PAM) continues to be a priority…
The post PAM as … Continue reading PAM as a Service: It’s All a Matter of Trust

The Friday 15: All About PAM in 15 Minutes

As a security professional, you’re busier than ever, juggling work, life and everything in between. With convenience being of the utmost importance to us these days, we are excited to launch The Friday 15.  This…
The post The Friday 15: Al… Continue reading The Friday 15: All About PAM in 15 Minutes

Cloud Opportunities Drive Security-as-a-Service Adoption

The power of human connection has been highlighted during this dramatic shift in the way we live and work. From afar, families are sharing stories and laughter via video chats, co-workers are holding virtual happy…
The post Cloud Opportunities Drive … Continue reading Cloud Opportunities Drive Security-as-a-Service Adoption

Know thy Enemy: Threat Analytics Boosts PAM Effectiveness

“Every battle is won before it is fought” ― Sun Tzu, The Art of War The Art of War, Chinese Philosopher Sun Tzu’s treatise on military strategy, is one of the most influential texts in modern…
The post Know thy Enemy: Thr… Continue reading Know thy Enemy: Threat Analytics Boosts PAM Effectiveness