<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

What You Don’t Know Can Hurt You: Triton Malware

[fa icon="calendar'] Aug 14, 2019 11:36:08 AM / by WALLIX

[fa icon="comment"] 0 Comments

Everyone has heard the aphorism that “What you don’t know can’t hurt you.” Of course, the expression is patently false in a wide variety of contexts – and it’s especially false when it comes to hidden cybersecurity threats, some of which are capable of inflicting damage far more severe than data breaches and identity theft. One such cyberthreat that could potentially hurt millions, not just financially but physically, is the malware known as Triton.

Read More [fa icon="long-arrow-right"]

Rise of the Machines: Not All Privileged Users Are People

[fa icon="calendar'] Aug 8, 2019 10:41:44 AM / by WALLIX

[fa icon="comment"] 0 Comments

In complex, complicated networks, privileged access is a fact of life – and privileged access management (PAM) is a necessity. The need for PAM stems from the fact that users will need varying levels of privileged access at different times and under different circumstances: In-house DBAs will need access to database servers to perform their daily work, for example, while network engineering consultants will need a completely different set of privileges in order to accomplish certain tasks for which they’ve been retained.

Read More [fa icon="long-arrow-right"]

How MFA and PAM Work Together

[fa icon="calendar'] Jul 30, 2019 9:04:00 AM / by WALLIX

[fa icon="comment"] 0 Comments

Corporate network environments are typically large, with many points of access that can potentially be exploited to gain unauthorized entrance to the network, and to the resources and data within that network. In attempting to lock down systems against unauthorized access, cybersecurity teams will often use a “defense in depth” strategy whereby the system as a whole is protected by using multiple layers of defense that seek to ensure the protection individually of each of its components.

Read More [fa icon="long-arrow-right"]

Healthcare at Risk: Cybersecurity Challenges and Solutions

[fa icon="calendar'] Jul 23, 2019 9:00:00 AM / by WALLIX

[fa icon="comment"] 1 Comment

The cybersecurity challenges confronting healthcare providers are immense. Patient data must be constantly secured, and large numbers of connected devices must operate consistently and securely in an environment where patients, doctors, non-medical staff, the IT department, and outside contractors all require varying levels of system access. When one takes the challenges of securing such an environment together with the high value of patient data – in which a typical electronic health record (EHR) for an individual can contain their name, their social security number, their medical history, their banking and credit card information, the names of their relatives, and much more of value to hackers – it’s easy to see why healthcare is the industry most often targeted by hackers.

Read More [fa icon="long-arrow-right"]

Legacy Obstacles to Access Management

[fa icon="calendar'] Jul 17, 2019 3:04:22 PM / by WALLIX

[fa icon="comment"] 0 Comments

The extent to which business still runs on outdated tech might surprise you. Banks and other fintech companies, for example, still lean heavily on mainframes and other so-called “big iron” infrastructure because of its speed and reliability in handling thousands of transactions per second. Those kinds of capabilities beg the question as to whether such tech is indeed outdated – but legacy tech designed for high throughput does pose problems, with a high number of administrators citing integration with legacy systems as a challenge as they consider future planning and efforts.

Read More [fa icon="long-arrow-right"]