Cloud Security

The Egregious 11: Examining the Top Cloud Computing Threats

Each year, the Cloud Security Alliance (CSA) releases its “Top Threats to Cloud Computing” study to raise awareness of key risks and vulnerabilities in the cloud and promote strong security practices. The ...
Cyber Attacks in the Pandemic Era: More of the Same  

Cyber Attacks in the Pandemic Era: More of the Same  

Since COVID-19 began to spread rapidly across the globe, we’ve seen near-constant headlines of cyber attacks hitting organizations in the midst of chaos. An elite group of cyber criminals launched a sophisticated ...
Privileged Access Management

You’ve Heard of Social Distancing? Now Try Risk Distancing

In recent months, social distancing has played a star role in virtually every aspect of our personal and professional lives. Most of us are working from home. In short order, parents were ...
Credential Theft and Privileged Access Management

Verizon DBIR 2020: Credential Theft, Phishing, Cloud Attacks

Every year, the security industry at large eagerly awaits the release of the Verizon Data Breach Investigations Report (DBIR). Now in its thirteenth year, the DBIR is widely considered to be one ...
Securing Success: Reporting PAM “Wins” Back to the Business

Securing Success: Reporting PAM “Wins” Back to the Business

The director of Identity and Access Management (IAM) is fundamentally responsible for ensuring controls are in place to protect access to sensitive assets within the organization. This includes all aspects of identity, ...
IAM Director Privileged Access Management

Securing Success: Reporting PAM “Wins” Back to the Business

The director of Identity and Access Management (IAM) is fundamentally responsible for ensuring controls are in place to protect access to sensitive assets within the organization. This includes all aspects of identity, ...
PAM as a Service

PAM as a Service: It’s All a Matter of Trust

With shifting priorities and dynamic technology environments, IT security teams are looking for ways to cover the most ground while draining as few resources as possible. Privileged access management (PAM) continues to ...
Privileged Session Management

Native, Interactive Login Aids Privileged Session Management

We recently explored how native session management can help organizations secure workflows and protect privileged access while giving users the flexibility to work with their favorite applications and tools. As companies search ...