We have all seen the sign, “In case of fire, break glass, and pull alarm.” While this necessary mitigating control for fire safety is explicitly known and present in almost every building, an analogy translates into the cybersecurity landscape as “break glass accounts.” In fact, few risk-mitigating controls stir as much debate among CISOs as…
Tag Archives: IT Security
-
Identity Blind Spots on the Network Layer
September 25th, 2025 by Paul Hunter | Posted in Perspective, Research, Security Outcomes |
Tags: access management, cybersecurity, identity security, IT Security, Kron, KronPAM, KronTech, PAM, Privileged Access, privileged access management, Web App, Web Security, Zero trust
Webinar Title: Zero Trust Falls Short Without Network Identity: Lessons from Salt Typhoon Date: October 1, 2025 Registration: Save your spot here Abstract Identity for users, applications, servers, and cloud has matured. Network devices are often the exception. Shared device accounts, SSH key sprawl, limited per-command authorization, and weak session evidence create a gap that…
-
Salt Typhoon: How Network Admin Paths Became Attack Paths
September 23rd, 2025 by Paul Hunter | Posted in News, Perspective, Security Outcomes |
Tags: access management, cybersecurity, identity security, IT Security, PAM, Privileged Access, privileged access management, Web App, Web Security, Zero trust
Webinar Title: Zero Trust Falls Short Without Network Identity: Lessons from Salt Typhoon Date: October 1, 2025 Registration: Save your spot here Abstract Salt Typhoon highlights how valid credentials and built in tools can turn network administration into an attacker highway. This post walks a likely attack chain in plain language and shows where identity…
Recent Posts
- Close Hidden Gaps in Enterprise Password Management
- AI agents are forcing a reckoning with identity and control
- The State of Identity Governance in 2026: Why Boards Think Access Is Under Control When It Isn’t
- Beneath the AI iceberg: The forces reshaping work and security
- Why Modern MFA Keeps Failing and Why Assured Identity is the Next Security Frontier
Recent Comments
No comments to show.