The SolarWinds supply chain attack is another example of the damage that lateral movement by system intruders can cause. Tim Keeler of Remediant describes why detecting lateral movement is so challenging.
At its core, Zero Trust aspires to eliminate persistent trust, and enforce continuous authentication, least privilege, and microsegmentation. This approach reduces the attack surface and minimizes the threat windows during which attackers can inflict damage, helping to protect against simple malware attacks to...
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
This EMA Evaluation Guide is intended to provide actionable guidance on the key elements to consider when selecting a PAM solution and how to ensure the investment achieves organizational requirements for security and usability.
Download this guide now to better understand how modern PAM solutions offer among the...
Controlling, monitoring, and auditing privileges and privileged access—for employees, vendors,
systems, applications, IoT, and everything else that touches your IT environments is essential for
protecting against both external and internal threat vectors, and for meeting a growing list of
compliance...
In today’s perilous cyber world, companies must carefully check their vendors’ cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire.
But these can be a headache, because many questionnaires include hundreds of questions, and many of them are...
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
The KuppingerCole Leadership Compass for PAM is an overview of the market for Privilege Access Management (PAM) and provides a compass to help buyers find the solution that best meets their needs. In this special IBM edition of the report, KuppingerCole highlights IBM as a leader in the PAM space. IBM Security Verify...
This book gives IT professionals a practical understanding of privileged account management (PAM). It describes what privileged accounts are, where they reside throughout an IT environment, and how they function. Most importantly, this book explains the risks associated with these accounts and how to best protect them...
This free eBook, Cybersecurity for Dummies delivers a fast, easy read that describes what everyone needs to know to defend themselves and their organizations against cyber attacks - including simple steps everyone can take to protect themselves at work and at home.
It empowers your employees to understand and...
With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it's time all cyber security stakeholders got educated.
This free, 24-page book, Privileged Account Management for Dummies, gives you, your IT staff, and business stakeholders a practical understanding...
You need to be ready for a cyber attack with a proactive, coordinated incident response plan.
Download the latest whitepaper to learn:
Steps to take before an incident occurs to make sure people are prepared to act
Indicators of compromise that help you discover a cyber attack
Actions to take during each...
Cyber security technology goes hand in hand with policy-based governance. One of the first steps to privileged access management (PAM) success is defining clear and consistent policies that everyone who uses and manages privileged accounts understands and accepts.
You can use this sample policy as a starting point...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.