Based on our extensive experience we’ve identified the ways our most successful customers have started out. We distilled this into a set of best practices to help guide your Privileged Identity Management journey.
The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.
How does privileged identity management differ from conventional identity access management and password management products? We put together the following primer to explain.
A recent post in Slashdot referenced our password security survey, which found that out of 300 IT professionals surveyed, 26 percent admitted to using their privileged login rights to look at confidential information they should not have had access to in the first place.
Last week, Symantec reported that hackers targeted nearly 30 companies in the chemical industry this summer with the intent of stealing sensitive intellectual property (IP). According to the report, the attacks identified in Symantec’s research use a spear phishing methodology that carefully targets email recipients and fools them into compromising…
…based on my years of experience working with some very large and prominent enterprises, I’ve learned that there are some frequently overlooked security practices that organizations could begin implementing today in order to increase their security postures quickly.
With so many health record hacks and data leaks hitting the headlines, it will be interesting to see if other healthcare organizations follow the lead of this forward-thinking company.
CAG Control 12 (formerly CAG 8) lists precisely the minimum controls necessary – and the actions you’ll need to take – to secure privileged credentials.
Reports that hackers gained root-level access to the servers of WordPress.com means that the popular blog publishing platform now joins the long list of companies whose portals were hacked. But, had it not been for a sensible IT security approach at the company, the fallout could have been a lot worse….
The process of planning for migration to a cloud platform should be welcomed and not regarded as a chore by IT staff, as it is a clear opportunity to re-appraise data encryption systems.