Organizations are flocking to the cloud in droves, but many question the security of migrating critical resources to off-site, cloud services. In fact, Forrester reports that 58% of companies outsource half or more of their data center operations, servers, network, and storage infrastructure!
Elizabeth Vincent
Recent Posts
PAM | Securing the Cloud
[fa icon="calendar'] Nov 21, 2018 11:42:38 AM / by Elizabeth Vincent posted in Cloud Security
Why Privileged Account Security Should Be Your #1 Priority
[fa icon="calendar'] Oct 9, 2018 3:02:09 PM / by Elizabeth Vincent
When you return one day to find your house has been broken into, your first question is always, “How did they get in?” And when the doors and windows are all still closed, yet your valuables are gone, you’re sure those things didn’t just walk off on their own. Similarly, in the event of a data breach, your first question is inevitably, “How did this happen?”
What is Insider Threat?
[fa icon="calendar'] Aug 22, 2018 10:43:12 AM / by Elizabeth Vincent posted in Preventing Insider Threat
In the cybersecurity industry, we often talk about the ‘Insider Threat’ that organizations face in security their most critical data and assets. From manufacturing to healthcare, every business encounters the challenge of both preventing and detecting these risks. But what exactly is Insider Threat? What does it mean for business?
Controlling Privileged Access for Telecommunications & Cloud Service Providers
[fa icon="calendar'] Aug 8, 2018 11:53:49 AM / by Elizabeth Vincent posted in Improving Cybersecurity, Cloud Security
As cybersecurity concerns rise across all industries, as media and service companies, Telecommunications and Cloud Service Providers (CSPs) face particular challenges. With massive amounts of client data and critical infrastructure, they are tempting targets for hackers. Telecom and CSPs need security solutions that can adapt and evolve with them, and respond to challenges unique to their industries.
All eyes on us: 4-Eyes Session Monitoring
[fa icon="calendar'] Jul 25, 2018 12:01:02 PM / by Elizabeth Vincent posted in Preventing Insider Threat
IT security has never been so important, as hacks and data breaches are at an all-time high (and climbing). When it comes to the security of your data and infrastructure, visibility and control are paramount. You can put in place all manner of corporate policies and password rules, but oversight of administrator actions and the ability to review past activity are paramount for both peace of mind and compliance with stringent cybersecurity regulations.