Sign up here for the next Kansas City IAM User Group gathering on November 8 at 3:00-5:00 PM to see our very own Dan Beckett and Doug Simmons speak at Lidia’s – an upscale northern Italian restaurant!
We… Continue reading
You’re invited to join our complimentary webinar on privileged access management (PAM). Please click here to register.
Title: Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach
When: October 16, 2015 at 2:00… Continue reading
As we looked into the topic of core defense in a recent series of blog posts and discussions, we concluded that privileged account management (PAM) technologies would be of great value in protecting the most sensitive IT assets… Continue reading
IT is everywhere in critical infrastructure. The Internet. The electrical grid. The banking system. We don’t often think of the nationwide electrical grid (no matter what country you’re in) as a massive exercise in IT, but part of our critical… Continue reading
We are approaching a very tenuous era with respect to both corporate and individual privacy, and you shouldn’t be surprised to see a lot of dominoes fall over the next few years. I believe there are two key reasons data… Continue reading