cyber warfare

Cyber Security Landscape at RSA Conference

The Cyber Security Landscape at RSA Conference 2015

At this week’s RSA Conference we’re showing the latest release of our adaptive privilege management platform. We’re demonstrating how to remove excess local accounts and administrative memberships, provide local escalation, and create a moving target for cyber attackers that significantly limits the amount of time they have in your environment.

10 Privacy Threats to Beware

Equation, the NSA and Cyber Espionage

I’m always shocked when 20 year old exploits become news, but last week’s furor around the Equation cyber espionage group detailed in the Kaspersky report warranted a response. The infiltration technology mentioned in this report – introducing rogue firmware into the IT infrastructure supply chain – has been around for a very long time.

Waking Up to Zero Day Nightmares

Cyber-defense today is not about stopping intrusions. It is about creating architectures and processes that minimize losses and limit how far into the network intruders can go after they do manage to penetrate the perimeter with zero day attacks and similar exploits.

State-Sponsored Cyber Attacks: The Worst is Yet to Come

We polled attendees at the recent Black Hat USA 2014 in Las Vegas and learned that 93% of them believe the hacking landscape is only going to get worse. Worryingly, 44% of respondents believe the USA is losing the battle against state-sponsored cyber attacks.

Security that scales

Security that Scales

For a long time we have been beating the drum about how automation is the only way to get control over the powerful privileged identities in the enterprise. Our assertion has always been that every step from account discovery to password changes must be as automated as possible. To that end we have been developing faster, deeper and more sophisticated technology. Our philosophy is simple: cyber-warfare opponents use automation to find weaknesses. Only by employing automation for security, can you find and automatically repair weaknesses faster than your opponents can exploit them.