9 Cloud Security Best Practices Your Organization Should Follow

9 Cloud Security Best Practices Your Organization Should Follow

Transitioning to the cloud is one of the most significant technology shifts your company will face. Last year, over 80% of organizations operating in the cloud experienced at least one compromised account ...
™

How Recent Analyst Research can Help You Find the Right PAM Vendor

According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or ...
How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

Service accounts, by their nature, can take on a life of their own. They’re rarely tied to a human owner if managed at all, so service account sprawl takes over and organizations’ ...
Another place dynamic secrets is valuable is with databases

Ensuring Database Security in the DevOps Pipeline with Dynamic Secrets

The traditional “vault-and-forward” method for secrets management means a user or application authenticates to the vault and then gets access to the secrets they need. The fundamental problem is once those secrets ...

What does world-class Identity Governance look like?

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly ...

Rising to the Modern PAM Challenge

| | For CISOs, Industry News, PAM Advanced
What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both ...
Role-Based Access Control for a Complex Enterprise

Role-Based Access Control for a Complex Enterprise

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply ...
Privilege Manager Application Policies

Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security.  Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable ...

Secret Server Product Update: Enhancements for the New Reality of Cloud and Remote Work

The modern IT environment is diverse and constantly changing. In the always-on, Internet-connected global marketplace, traditional perimeters are disappearing as most organizations rely more and more on cloud-based applications to conduct business ...
dotmagazine meets... Joseph Carson: Understanding IoT from a Security Perspective

IAM: The Future of Identities and How We’ll Get There

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, ...