A recent cybersecurity news item should trigger concern for anyone involved in cloud-based software development. As reported in CSO, an attacker breached a popular Node.js module. After building trust and gaining owner-level access, he or she was able to push a compromised version that hid Bitcoin and Ethereum hot wallet credentials for malicious purposes in the code.
Securing DevOps in the Cloud with Privileged Access Management (PAM)
[fa icon="calendar'] Dec 7, 2018 6:18:07 PM / by WALLIX posted in Cloud Security
PAM | Securing the Cloud
[fa icon="calendar'] Nov 21, 2018 11:42:38 AM / by WALLIX posted in Cloud Security
Organizations are flocking to the cloud in droves, but many question the security of migrating critical resources to off-site, cloud services. In fact, Forrester reports that 58% of companies outsource half or more of their data center operations, servers, network, and storage infrastructure!
Controlling Privileged Access for Telecommunications & Cloud Service Providers
[fa icon="calendar'] Aug 8, 2018 11:53:49 AM / by WALLIX posted in Improving Cybersecurity, Cloud Security
As cybersecurity concerns rise across all industries, as media and service companies, Telecommunications and Cloud Service Providers (CSPs) face particular challenges. With massive amounts of client data and critical infrastructure, they are tempting targets for hackers. Telecom and CSPs need security solutions that can adapt and evolve with them, and respond to challenges unique to their industries.
PAM to the Rescue: 3 Common Security Scenarios
[fa icon="calendar'] Jul 12, 2018 12:37:55 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks, Cloud Security
Despite the globally-increasing threat of cyber attack, and what feels like near-daily major news reports of data breaches in our most sensitive industries, many companies still under-value cybersecurity. While the data breach fatigue is real, organizations from every sector need to ramp up their IT security practices.