<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Cybersecurity Basics From the Outside In

[fa icon="calendar'] Feb 12, 2020 4:23:33 PM / by WALLIX posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

The elements of effective cybersecurity are both a broad and a deep subject for discussion, and the details of any one particular element bears in-depth discussion of its own. That said, such details are often best left to companies' cybersecurity teams to investigate and implement – but in no regard should executive teams remain completely uninformed of the high-level elements that should comprise proper, well-rounded cybersecurity within their organizations.

Read More [fa icon="long-arrow-right"]

The Year of the RAT: Successful Cybersecurity By Knowing Your Threat

[fa icon="calendar'] Jan 24, 2020 5:33:58 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

Chinese New Year 2020: The Year of the RAT

The year of the rat is going to be a strong, prosperous and lucky year, for those that carefully plan their objectives.

Read More [fa icon="long-arrow-right"]

The Biggest Data Breaches of 2019 - and How PAM Could Have Stopped Them

[fa icon="calendar'] Dec 18, 2019 3:07:03 PM / by WALLIX

[fa icon="comment"] 2 Comments

Every year over the past decade has seen a variety of successful hacking attempts and data breaches at companies both large and small, and 2019 has been no different. Here are three of the top data breaches this year, along with some observations on how privileged access management (PAM) might have helped to mitigate or even possibly have prevented these breaches.

Read More [fa icon="long-arrow-right"]

Bastion Session Sharing: Empowering Secure Third-Party Collaboration

[fa icon="calendar'] Dec 12, 2019 4:27:00 PM / by Eric Gaudin

[fa icon="comment"] 0 Comments

Collaboration is essential in order to handle the diversity and complexity of the IT infrastructure required by today's digital transformation. This is particularly true when external contractors request access to critical infrastructure to provide maintenance to systems and equipment, and assist with critical systems setup.

Read More [fa icon="long-arrow-right"]

After the Jump: Lateral Moves within Networks

[fa icon="calendar'] Nov 28, 2019 11:41:41 AM / by WALLIX posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

Corporate networks can be sprawling affairs comprising thousands of connected devices. Securing such networks is too often focused only on locking down access points into the network. But what happens once a user (or intruder) gains access to one of those network entry points? With an ever-evolving cyberthreat environment and a constant barrage of new tools deployed by hackers in their attempts to gain network access, the assumption of every smart cybersecurity team should be that their external defenses will be penetrated.

Read More [fa icon="long-arrow-right"]