NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

In physics, the observer effect theory asserts that the mere observation or measurement of a system or event unavoidably alters that which it is observing/measuring. In other words, the tools or methods used for measurement interfere with the system or event...
JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT (JIT PAM): THE MISSING PIECE TO ACHIEVING “TRUE” LEAST PRIVILEGE & MAXIMUM RISK REDUCTION

JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT (JIT PAM): THE MISSING PIECE TO ACHIEVING “TRUE” LEAST PRIVILEGE & MAXIMUM RISK REDUCTION

Just-in-Time Privileged Access Management (JIT PAM) is the method by which organizations can enforce “true” least privilege, to drastically reduce the threat surface. So, what exactly do I mean by “true” least privilege? I’ll provide a condensed overview in this...
USING SECURE REMOTE ACCESS AS A BASTION HOST FOR CLOUD-BASED ACCESS

USING SECURE REMOTE ACCESS AS A BASTION HOST FOR CLOUD-BASED ACCESS

With the proliferation of infrastructure components that have moved to web-based management interfaces in the Cloud, information and security technology administrators are faced with new threats for managing credentialsto administer these solutions. It’s a...
Cyber Security 2019: Matrix42 has the lead

Cyber Security 2019: Matrix42 has the lead

Matrix42 is leader in ISG Quadrant “Data Loss Leakage Prevention” This post is also available in: German Digital transformation is increasingly gaining traction in various business sectors. The consequence of this, however, is that the risk of...