Despite the globally-increasing threat of cyber attack, and what feels like near-daily major news reports of data breaches in our most sensitive industries, many companies still under-value cybersecurity. While the data breach fatigue is real, organizations from every sector need to ramp up their IT security practices.
PAM to the Rescue: 3 Common Security Scenarios
[fa icon="calendar'] Jul 12, 2018 12:37:55 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks, Cloud Security
IGA and PAM: How Identity Governance Administration Connects with Privileged Access Management
[fa icon="calendar'] May 15, 2018 9:05:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Misappropriation of user identity is one of the root causes of many serious cybersecurity incidents. The threat can appear as a malicious actor impersonating an authorized system user, a hacker creating a fictitious user account, or a legitimate user taking improper actions. In each case, security managers may have trouble detecting the actions of an ill-intentioned user or they discover the problem after the fact.
Privileged Access Management (PAM) for MSSPs Using AWS
[fa icon="calendar'] May 2, 2018 9:00:00 AM / by WALLIX posted in Mitigating External Attacks
Amazon Web Services (AWS) present a good news story for service providers, but security challenges remain. AWS gives service providers a way to grow their businesses without having to deal with many of the hassles and costs of maintaining a cloud infrastructure. A Managed Security Services Provider (MSSP), for instance, can let AWS do the heavy lifting for them, supplying an essentially infinitely scalable infrastructure.
Azure Security Monitoring and Privileged Access Management (PAM)
[fa icon="calendar'] Apr 17, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks
Microsoft Azure offers broad, exciting new capabilities for enterprise IT. The new Azure IoT Hub, which enables large-scale deployment of Internet of Things devices, is just one example. The IoT Hub, however, presents a number of challenges, such as security monitoring on Azure.
Test your Cybersecurity Skills: Take the Quiz!
[fa icon="calendar'] Apr 12, 2018 10:56:38 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks
Did you know that the greatest threat your organization faces is from your own privileged users? Intentionally or not, employees and 3rd-party providers with privileged accounts represent your most significant vulnerability to cyber attacks.