Identity & Access
A Brief Guide to Privileged Access Management (PAM): Definitions, Necessity, and Key Selection Criteria
7 min read PAM is an intensifying interest for DevOps teams trying to bring the right set of access controls to bear on their infrastructure. The post A Brief Guide to Privileged ...
Irony of Ironies: CISA Hacked — ‘by China’
Free rides and traffic jams: U.S. Cybersecurity and Infrastructure Security Agency penetrated in February, via vuln in Ivanti ...
The Essential User Access Review Checklist [Excel Template]
Do you have employees with access to sensitive systems they no longer need? Are there team members in your organization who, following a department change, find themselves locked out of essential tools ...
Are You Ready to Protect Your Company From Insider Threats? Probably Not
The bad news is insider threats are on the rise. The worse news is that most companies are unprepared to meet the moment ...
NSA Issues Guidance for Enterprises Adopting Zero Trust
The National Security Agency (NSA) wants organizations adopt zero-trust framework principles to protect their enterprise networks and is releasing guidance to help them get there. The agency is arguing that adopting controls ...
5 Tips for Securing Your Active Directory
Active Directory (AD) is Microsoft’s directory server. Ubiquitous across Fortune 500 and small businesses alike, AD is the software that connects on-prem servers, workstations, users, and networks. AD’s cloud-based counterpart, Azure, completes ...
How to Adopt Phishing-Resistant MFA
In a recent blog post, we discussed what phishing-resistant multi-factor authentication (MFA) is and why... The post How to Adopt Phishing-Resistant MFA appeared first on Axiad ...
Facebook/Insta FAIL — ‘Anonymous Sudan’ has a Super Tuesday: ‘We Did It.’
Shooper Choosday: Was yesterday’s Meta outage outrage caused by a Russian DDoS? ...
ITRC Finds Online Job Scams on the Rise
The ITRC reported a surge in online job scams targeting unsuspecting job seekers for their personal information ...
Self-Replicating AI Malware is Here😱 #ComPromptMized
Skrik: Researchers worm themselves into your nightmares ...