<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

Cybersecurity Simplified: Security is Nothing Without Control

[fa icon="calendar'] Jul 10, 2018 11:52:26 AM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

When talking about Privileged Access Management, it’s important to focus on the real objective: to ensure that only the right person can access the right system at any given time. A password vault can easily handle that, but you really need more. It’s far more important to ensure that when someone accesses a target, this person does only what they are supposed to do, and nothing more.

Read More [fa icon="long-arrow-right"]

Will you survive your next security audit?

[fa icon="calendar'] Apr 3, 2018 2:04:03 PM / by Eric Gaudin posted in Preventing Insider Threat, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

A security audit is something that every single company with an internet connection, and that handles customer/individual data should be concerned with. Without elaborating more than necessary, recent regulations makes it, if not mandatory, at least strongly recommended to audit your IT security to ensure compliance.

Read More [fa icon="long-arrow-right"]

WAB is dead, long live the Bastion 6.0

[fa icon="calendar'] Feb 8, 2018 2:27:54 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 2 Comments

New year, new version for the long-awaited version: the Bastion 6.0.

Read More [fa icon="long-arrow-right"]

Understanding the Uber hack with Privileged Access Management (PAM)

[fa icon="calendar'] Nov 29, 2017 4:08:56 PM / by Eric Gaudin posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

  • The data of 57 million users has been stolen from Uber.
  • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data.
Read More [fa icon="long-arrow-right"]

SSH agent-forwarding: going barefoot (socket-less)

[fa icon="calendar'] Nov 24, 2017 11:28:50 AM / by Eric Gaudin posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Would you really wear sockets with flip flops to walk on a nice sandy beach? The same thing goes with SSH agent-forwarding: using a socket can sometimes be inappropriate.

Read More [fa icon="long-arrow-right"]

to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security