Since my Q3 update on the Rational Cybersecurity book project I’ve reached an important milestone. Take a look…
My goal is to get to a final draft (after rewrites) before the year’s end.
I’m also grateful to have… Continue reading
Cybercriminals are mining a lucrative revenue source – ransomware. These attackers launch malware to encrypt digital files and demand bitcoin payment to unlock them. We know that local governments are often paying ransom and that private industry is also suffering… Continue reading
Do you think privileged access management (PAM) for cloud services, DevOps, and service accounts may need improvement? If so, please register for my webcast on October 23!
On July 19, Capital One Financial Corporation determined it had sustained a data breach of over 106 million user records due to a cyberattack by a user named “Erratic” on Twitter. The company announced the breach to the media July… Continue reading
Do you think that Active Directory privileged management practices may pose risks to your organization? If so, please register for my webcast on September 12!
Since my Q2 update on the Rational Cybersecurity for the Business book project I’ve continued to forge ahead, completing another 3 draft chapters. My goal is to get to final draft (after rewrites) before year’s end!
Rational Cybersecurity for… Continue reading
Identity Governance and Administration (IGA) and Privileged Account Management (PAM) need a makeover for cloud computing. During a recent consulting engagement, I took a deep dive into Cloud IGA and Cloud PAM. I’ll be sharing my perspectives over the next… Continue reading
Why is identity perhaps the most critical security subject matter domain today? What do you think? Hint: Take a look at the consequences and causes of most breaches. Also, tune in to hear me cover the subject at 10:00… Continue reading
“A global reputation system will restore trust,” said RSA CEO Rohit Ghai during a keynote presentation I reviewed at RSA 2019. In the same way that whitelisting is more effective than blacklisting in the never-ending antivirus… Continue reading