NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

In physics, the observer effect theory asserts that the mere observation or measurement of a system or event unavoidably alters that which it is observing/measuring. In other words, the tools or methods used for measurement interfere with the system or event...
BEYONDTRUST PRIVILEGED IDENTITY DELIVERS NEW FUNCTIONALITY & ENHANCED USER EXPERIENCE IN LATEST RELEASE

BEYONDTRUST PRIVILEGED IDENTITY DELIVERS NEW FUNCTIONALITY & ENHANCED USER EXPERIENCE IN LATEST RELEASE

It is my pleasure to announce the release of BeyondTrust Privileged Identity version 5.5.5.0. Privileged Identity continuously discovers, tracks, and automatically provides privileged accounts with unique and frequently changing credentials across...
HOW TO BEST MEASURE YOUR ITSM TOOL SUCCESS: 5 TIPS

HOW TO BEST MEASURE YOUR ITSM TOOL SUCCESS: 5 TIPS

Perhaps you’ve recently implemented a new IT support, or IT service management (ITSM), tool, or you’re simply wanting to assess the suitability of your current ITSM tool before changing it. What’s the best way to go about evaluating its success within your...
BLACK HAT 2019: CULTIVATING A CULTURE OF SECURITY IN YOUR ORGANIZATION

BLACK HAT 2019: CULTIVATING A CULTURE OF SECURITY IN YOUR ORGANIZATION

As the Product Manager for Remote Support at BeyondTrust, it is important to keep up with security trends that affect the service desk. This was my first time attending Black Hat, and I was excited to catch Dino Dai Zovi’s keynote and sit in on breakout...