This month marks the 25th anniversary of the famous “On the Internet, no one knows you’re a dog” cartoon appearing in The New Yorker. Oh, how true that was, and still is, a quarter century later. Chances are, artist Peter Steiner had no idea how prescient his drawing was. We are indeed in the Internet dog days, of identity access management (IAM) and PAM at least.
WALLIX
Recent Posts
Uniting Identity Access Management (IAM) and PAM for Cohesive Identity Governance
[fa icon="calendar'] Sep 5, 2018 11:22:37 AM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity
The Critical Elements of a Scalable PAM Solution
[fa icon="calendar'] Aug 28, 2018 9:00:00 AM / by WALLIX posted in Controlling Third Party Access, Improving Cybersecurity
An organization’s security posture benefits from the ability to manage and track access to privileged accounts. Privileged users—as well as those impersonating them—can present major security threats. A Privileged Access Management (PAM) solution offers an answer. It enables security teams to stay on top of privileged account access. To work, however, it must be a scalable PAM solution. The PAM solution must scale flexibly in a growing organization or suffer being disused, to the detriment of security overall. What does it take to build a scalable PAM solution? This article explores the answer to that question.
Supply Chain Management and Supply Chain Security: Addressing Vulnerabilities with PAM
[fa icon="calendar'] Aug 14, 2018 9:02:00 AM / by WALLIX posted in Improving Cybersecurity
Supply chains are essential for the proper functioning of industrial systems and critical infrastructure. However, they’re also quite messy, in terms of security. Supply chains invariably connect users and systems from multiple entities, often in different countries. This setup exposes every company in the supply chain to cyber risk. Among countermeasures, Privileged Access Management (PAM) offers one of the best ways of minimizing supply chain vulnerabilities.
Privileged Account Security Solution | Understanding Privileged Account Security
[fa icon="calendar'] Jul 31, 2018 9:03:00 AM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity
SCADA Security and Privileged Access Management (PAM)
[fa icon="calendar'] Jul 17, 2018 9:00:00 AM / by WALLIX
Industrial plants and power utilities commonly employ the well-established Supervisory Control and Data Acquisition (SCADA) framework to manage their Operational Technology (OT) systems. In recent years, SCADA’s cyber risk exposure has increased with the advent of the Internet and the IP-enabling of traditionally isolated SCADA system elements.