Detection Only Solutions Aren't Enough For Today's Security Teams

Detection Only Solutions Aren’t Enough For Today’s Security Teams

Last week I had the opportunity to speak with several CISOs about what they are doing to deal with cyberattacks, breaches and internal threats. A consistent theme I heard is that detection only solutions aren't enough. They need more practical approaches to rapidly respond to anomalous behavior and they need ... Read More
6 Tips for Securing Privileged Accounts in the Enterprise

6 Tips for Securing Privileged Accounts in the Enterprise

Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers can easily obtain credentials via phishing attacks, brute force, keyloggers, pass-the-hash techniques, or using a database of previously ... Read More
Simplifying PCI DSS 3.2 Compliance with Preempt

Simplifying PCI DSS 3.2 Compliance with Preempt

If your organization handles credit cards, you are no doubt familiar with Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to strengthen security of cardholder transactions and data in order to reduce fraud. PCI ... Read More
Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

Corporate Culture Shift: Using Adaptive Security to Influence Employee Security Behavior

I’ve heard it many times from customers: “IT Security needs to be transparent to users in order to be successful.” Unfortunately, we are now in a digital age where things have dramatically changed and research has shown over and over that credential compromise is the top way that hackers breach ... Read More
Study Finds Employee Security Habits Reveal Risky Imbalance

Study Finds Employee Security Habits Reveal Risky Imbalance

Human nature motivates us to enhance productivity, make things easy, find workarounds and to crave information that is being kept from us. How do these motivations change the way people work? Do their actions put their company at risk? Do IT Security teams need to understand basic psychology to protect ... Read More
How this Retailer Could have Kept my Business with Better IT Security Process

How this Retailer Could have Kept my Business with Better IT Security Process

Hmm, I thought I remembered my password. As I tried to log into my account with a large retailer known for their athletic wear, I click the forgot password link. I enter my email address ... Read More
Defending Against Credential Compromise (VIDEO)

Defending Against Credential Compromise (VIDEO)

Credential Compromise has been a leading attack vector for the last five years. There are a variety of ways that attackers can do this. It could be by guessing passwords, phishing emails, spyware, or even pulling credentials out of memory. To detect and more proactively defend against credential compromise, organizations ... Read More