Privileged Identities


Keys to the IT Kingdom

Keys to the Kingdom

The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.




Chemical Company Spear Phishing Attacks Could Have Been Prevented

Last week, Symantec reported that hackers targeted nearly 30 companies in the chemical industry this summer with the intent of stealing sensitive intellectual property (IP). According to the report, the attacks identified in Symantec’s research use a spear phishing methodology that carefully targets email recipients and fools them into compromising…