NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

NO-IMPACT AND ZERO-FRICTION CYBERSECURITY, IS IT POSSIBLE?

In physics, the observer effect theory asserts that the mere observation or measurement of a system or event unavoidably alters that which it is observing/measuring. In other words, the tools or methods used for measurement interfere with the system or event...
BEYONDTRUST PRIVILEGED IDENTITY DELIVERS NEW FUNCTIONALITY & ENHANCED USER EXPERIENCE IN LATEST RELEASE

BEYONDTRUST PRIVILEGED IDENTITY DELIVERS NEW FUNCTIONALITY & ENHANCED USER EXPERIENCE IN LATEST RELEASE

It is my pleasure to announce the release of BeyondTrust Privileged Identity version 5.5.5.0. Privileged Identity continuously discovers, tracks, and automatically provides privileged accounts with unique and frequently changing credentials across...
HOW TO BEST MEASURE YOUR ITSM TOOL SUCCESS: 5 TIPS

HOW TO BEST MEASURE YOUR ITSM TOOL SUCCESS: 5 TIPS

Perhaps you’ve recently implemented a new IT support, or IT service management (ITSM), tool, or you’re simply wanting to assess the suitability of your current ITSM tool before changing it. What’s the best way to go about evaluating its success within your...
JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT (JIT PAM): THE MISSING PIECE TO ACHIEVING “TRUE” LEAST PRIVILEGE & MAXIMUM RISK REDUCTION

JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT (JIT PAM): THE MISSING PIECE TO ACHIEVING “TRUE” LEAST PRIVILEGE & MAXIMUM RISK REDUCTION

Just-in-Time Privileged Access Management (JIT PAM) is the method by which organizations can enforce “true” least privilege, to drastically reduce the threat surface. So, what exactly do I mean by “true” least privilege? I’ll provide a condensed overview in this...
USING SECURE REMOTE ACCESS AS A BASTION HOST FOR CLOUD-BASED ACCESS

USING SECURE REMOTE ACCESS AS A BASTION HOST FOR CLOUD-BASED ACCESS

With the proliferation of infrastructure components that have moved to web-based management interfaces in the Cloud, information and security technology administrators are faced with new threats for managing credentialsto administer these solutions. It’s a...