Every security officer wants to minimize their attack surface. One of the best ways to do this is by implementing a least privilege strategy. One report revealed that data breaches…
Browsing CategoryPrivileged Access
Millions Lost in Minutes — Mitigating Public-Facing Attacks
In recent years, many high-profile companies have suffered destructive cybersecurity breaches. These public-facing assaults cost organizations millions of dollars in minutes, from stock prices to media partnerships. Fast Company, Rockstar,…
Effectively Enforce a Least Privilege Strategy
Every security officer wants to minimize their attack surface. One of the best ways to do this is by implementing a least privilege strategy. One report revealed that data breaches…
Millions Lost in Minutes — Mitigating Public-Facing Attacks
In recent years, many high-profile companies have suffered destructive cybersecurity breaches. These public-facing assaults cost organizations millions of dollars in minutes, from stock prices to media partnerships. Fast Company, Rockstar,…
Boost SAP Security With Zero Trust
How can your organization improve its Systems Applications and Products (SAP) risk posture? Aligning with the key principles of zero trust through tangible and specific measures is one way. To…
How to Use Design Thinking for Next-Gen Privileged Access Management Architecture
As cyberattacks speed up and become more complex, defenders need to do the same. One large component of this is privileged access management, or PAM. But PAM itself is always…
Zero Trust: Bringing Privileged Access and Data Security Analytics Together
Who owns the data in your organization? If you’re like many, there’s a chance it’s fragmented. Maybe legal owns governance while security owns data security. IT, legal, security and line-of-business…
Why You Might Need to Outsource Your Privileged Access Management Program
The crown jewels of cybercrime are the level of access privileged users have to your company’s most critical data and assets. Therefore, monitoring them with a Privileged Access Management (PAM)…
#TwitterHack: Power, Privilege and Pandemic
On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of…
How to Create Value With Your (Security) Data Analytics Program
I have been fascinated by data analytics for all my professional life — from my early days of using Linux command-line tools like grep, cut, sort and unique to make…