IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the...
UNLOCK PRIVILEGED ACCESS MANAGEMENT SYNERGIES BY INTEGRATING PASSWORD AND PRIVILEGE MANAGEMENT FOR UNIX/LINUX SYSTEMS

UNLOCK PRIVILEGED ACCESS MANAGEMENT SYNERGIES BY INTEGRATING PASSWORD AND PRIVILEGE MANAGEMENT FOR UNIX/LINUX SYSTEMS

Privileged Access Management (PAM) is a subset of Identity Governance. As a discipline, it consists of much more than just password management. Today, PAM encompasses credential (password, key, etc.) storage and rotation, session monitoring and auditing, least...
MODERNIZING YOUR PRIVILEGED PASSWORD SECURITY

MODERNIZING YOUR PRIVILEGED PASSWORD SECURITY

For those of us that make a habit of catching the nightly news, each day often seems like a replay of the previous: “Major Data Breach of Huge Corporation, details at 11.” And then you ask yourself, “could this happen to my organization?” Well, it can and probably...
HOW TO USE PRIVILEGED ACCESS MANAGEMENT FOR CYBER FORENSICS & SECURITY BREACH REMEDIATION

HOW TO USE PRIVILEGED ACCESS MANAGEMENT FOR CYBER FORENSICS & SECURITY BREACH REMEDIATION

No one wants to respond to a security incident or a breach. Instead the highest priority should be to stop a cyberthreat before it compromises the organization. But in reality, preventing a cyberattack from landing is not always possible. The steps...