The Center for Internet Security (CIS), the non-profit whose mission is to "enhance the cyber security readiness and response of public and private sector entities,” publishes “The CIS Critical Security Controls for Effective Cyber Defense.”
WALLIX
Recent Posts
CIS Critical Security Controls: The Role of PAM
[fa icon="calendar'] Oct 17, 2017 4:00:00 PM / by WALLIX
Deloitte Breach: A Lesson in Privileged Account Management
[fa icon="calendar'] Oct 13, 2017 12:19:32 PM / by WALLIX posted in Mitigating External Attacks
Another day, another major data breach uncovered at a high-profile company. Deloitte has recently announced that malicious outsiders infiltrated their email database and gained access to everything it contained, including confidential emails, attachments, IP addresses, login information, and more.
The right way to SUDO for PAM
[fa icon="calendar'] Oct 11, 2017 4:00:00 PM / by WALLIX
SUDO or NOT SUDO. In the PAM industry, both sides have many supporters and with arguments such as: “It’s free but it’s not maintained”. As usual, there is no right or wrong answer, but there is a right way and a wrong way to secure your systems.
SWIFT Framework: SWIFT security and PAM
[fa icon="calendar'] Oct 6, 2017 4:07:01 PM / by WALLIX
The Society for Worldwide Interbank Financial Telecommunication (SWIFT), the global banking information network, facilitates over $5 trillion in bank transfers every day. It therefore presents an extremely high value target for cyber-attackers.
Maintaining Visibility Over Remote Access with Session Management
[fa icon="calendar'] Oct 2, 2017 2:39:02 PM / by WALLIX
Remote access is no longer an “option” for organizations, it is a necessity for both IT and business operations. Remote access is required by your own employees and third-party service providers like software vendors, support teams, and consultants.