Looking forward to the 2021 cybersecurity landscape
Coming to the end of 2020, which has been a year of “unprecedented times,” impacted cybersecurity in a big way. With barely any time left in 2020, it’s time to look at what we think 2021 could bring. The main hope is that it will be a little less frantic ... Read More
Ransomware’s brutal ‘second wave’
Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a patient in a hospital ... Read More
Ransomware’s Brutal ‘Second Wave’
Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a patient ... Read More
Why efficiency and security are more important than ever for vendor access management
We’re not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing as vendors often offer an easier way into your network than a full-frontal ... Read More
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or ... Read More
How the Cloud Could Improve Vendor Access Management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside ... Read More
Reasons to consider a cloud deployment of your vendor access management system
To cloud or not to cloud? That seems to be the question for every IT system these days and vendor management is no exception. The benefits of cloud which include cost savings, expensing IT versus capital expenditures and the scalability of cloud often make it highly attractive to IT managers ... Read More
Questions to ask when shopping for a remote access solution
When researching remote access solutions, there are a lot of options to choose from. From the big generic access platforms such as VPNs and desktop sharing tools, down to the niche, like privileged access management (PAM) and vendor privileged access management (VPAM) players who perform extra functions for specific use ... Read More
What to expect when you’re expecting… To be hacked
If you interview the IT and security staff of a company that has had a breach, very few of them would say they were expecting to get hacked. These “survivors” are often in a state of disbelief that it has happened to them and suffer from analysis paralysis when it ... Read More
What to Expect When You’re Expecting … To Be Hacked
If you interview the IT and security staff of a company that has had a breach, very few of them would say they were expecting to get hacked. These “survivors” are often in a state of disbelief that it has happened to them and suffer from analysis paralysis when it ... Read More

