privileged identity management


Keys to the IT Kingdom

Keys to the Kingdom

The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.









NCCoE’s Cyber Security Guidelines for Electric Utilities Are A Good Start

NCCoE’s Cyber Security Guidelines for Electric Utilities Are A Good Start

The National Cybersecurity Center of Excellence’s (NCCoE) recent cyber security guide Identity and Access Management for Electric Utilities identified a serious security concern within the energy sector, and if people follow the advice in this guide they will be have a better overall IT security posture. There is one area that doesn’t get a full treatment and one glaring omission, though.