Security Today sat down with noted cyber security expert Philip Lieberman to get his insights on today’s top IT security challenges in this 8-minute video interview.
There are several factors that even the simplest Privileged Identity Management project should encompass. We’ll look at four of them here.
The process to track the criminals involved in the WannaCry attack starts with trying to get an attribution (who did it or profited by it down to specific individuals – including where they are located) on one or more of three elements of the attack.
Based on our extensive experience we’ve identified the ways our most successful customers have started out. We distilled this into a set of best practices to help guide your Privileged Identity Management journey.
The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.
Here’s the situation. This is a garden variety cyber attack. In fact, many companies are victims of these types of attacks and choose to pay off the attackers.
Technology can be like old clothes. There’s a level of comfort in holding onto software you’ve been using for years. But, there’s also discomfort when you outgrow its usefulness.
The idea is that when an incident occurs it triggers an automated credentials rotation in real-time to shut the bad guys down.
The survey queried respondents about changing default passwords on IoT devices. More than half admitted they do not have a process to change these passwords.
Without any privileged password management controls, most long-term enterprise employees collect credentials like a janitor collects keys.