The cloud is just the same technologies from an on-premises environment running somewhere else. Any risks that you had on-premises are still there in the cloud.
What if organizations could react to cyber attacks with an automated defense? If they could take control of their privileged accounts it would reduce the attacker’s surface for compromise.
The goal of any security program is to stop or mitigate a threat. To resolve the administrative credentials security threat, you must regularly change the administrator passwords. And then make each password unique.
WikiLeaks withheld the source code for the CIA hacking tools. One might wonder though, what could happen if WikiLeaks did publish this code?
This week’s sensational Wikileaks revelations about CIA hacking tools has raised all sorts of questions about the US intelligence agency’s hacking arsenal. Here’s my take on the matter.
Key regulatory standards – including PCI-DSS, HIPAA, Sarbanes-Oxley and others – share common requirements when it comes to securing privileged identities
Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.
There are a number of significant changes in PCI-DSS 3.2. We’ll just take a look at the new aspects that directly affect security controls. Here are the highlights of those new requirements.
Ransomware has traditionally been targeted at careless individuals or corporations with money on hand to ensure the bad guys get paid.
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.