Archives
-
Managing Non-Human Identities for Vendor Access and Least Privilege Application Management
January 28th, 2021 by Morey Haber | Posted in How To Advice | No Comments
While often overlooked, machine identities outnumber the human identities enterprises need to manage and protect. Their prevalence, coupled with the challenges of managing digital certificates and their sometimes, short-lived nature, creates potential gaps in visibility and control that skilled threat actors will eagerly look to exploit. Just like human identities, machine identities are at risk….
-
2020: A Year Like No Other
December 31st, 2020 by Jeff Reich | Posted in News | No Comments
As we approach the end of 2020 (finally!) and reflect on the last 364 days, I think it is safe to say that everyone shares this same perspective – it was truly a year like no other. And while most every aspect of our personal lives was turned upside down; this year also represented a…
-
Mitigating the Risk of Social Engineering
August 10th, 2020 by Jerod Brennen | Posted in Perspective | No Comments
Peel back the layers of most enterprise data breaches, and credential theft will be at the center. For an attacker, user credentials are worth their weight in gold, and getting them means exploiting the weakest link in the chain of cybersecurity: people. Even in 2020, social engineering remains arguably the most reliable tool in an…
-
BYO[D] Doesn’t Have to Mean Bring Your Own [Vulnerability]
June 1st, 2020 by Baber Amin | Posted in Best Practices | No Comments
The Bring-Your-Own-Device (BYOD) model of operating has been a double-edged sword for IT professionals. On the one hand, it empowers and allows for business productivity. On the other hand, it continues to create a serious challenge for organizations as IT and security professionals find ways to enforce access control across a diverse ecosystem of mobile…
Recent Comments
No comments to show.