How does privileged identity management differ from conventional identity access management and password management products? We put together the following primer to explain.
A recent post in Slashdot referenced our password security survey, which found that out of 300 IT professionals surveyed, 26 percent admitted to using their privileged login rights to look at confidential information they should not have had access to in the first place.
Last week, Symantec reported that hackers targeted nearly 30 companies in the chemical industry this summer with the intent of stealing sensitive intellectual property (IP). According to the report, the attacks identified in Symantec’s research use a spear phishing methodology that carefully targets email recipients and fools them into compromising…
…based on my years of experience working with some very large and prominent enterprises, I’ve learned that there are some frequently overlooked security practices that organizations could begin implementing today in order to increase their security postures quickly.
With so many health record hacks and data leaks hitting the headlines, it will be interesting to see if other healthcare organizations follow the lead of this forward-thinking company.
CAG Control 12 (formerly CAG 8) lists precisely the minimum controls necessary – and the actions you’ll need to take – to secure privileged credentials.
Reports that hackers gained root-level access to the servers of WordPress.com means that the popular blog publishing platform now joins the long list of companies whose portals were hacked. But, had it not been for a sensible IT security approach at the company, the fallout could have been a lot worse….
The process of planning for migration to a cloud platform should be welcomed and not regarded as a chore by IT staff, as it is a clear opportunity to re-appraise data encryption systems.
Organizations are beginning to become more intelligent, however enterprises seeking to eliminate the potential for anonymous employee access to sensitive data are extending their Security Information and Event Management (SIEM) platforms through the addition of privileged identity management (PIM) solutions.
More than anything, this story demonstrates that life is never easy when it comes to IT systems planning. IT professionals should view the insider threat as being just as dangerous as the external hacker attacks that many security experts seem preoccupied with.