Active Directory security threats are increasing per part 1 of this post, and organizations must deploy an array of preventative, procedural, and detection controls to avoid becoming one of the next victims.
The AD protection matrix above depicts a… Continue reading
Data protection requires effectively coordinating good practices across many security domains. It is actually a large subset of the overall security program. Take a look:
If you’re familiar with Security Architects Partners, you’ll know we’re both broad and deep in… Continue reading
Last week we delivered our Privileged Access Management (PAM) webinar. In this presentation we noted that because over-privileged accounts are rampant in the IT environment, PAM is a technology that most organizations should consider in the effort to prevent a… Continue reading
You’re invited to join our complimentary webinar on privileged access management (PAM). Please click here to register.
Title: Harnessing Privileged Access Management (PAM) to Defend Core Digital Assets Against a Breach
When: October 16, 2015 at 2:00… Continue reading
Work with clients on a privileged account management (PAM) system design and you’ll start seeing first hand some challenges balancing availability with assurance. One of the reasons is the need for a “break glass” scenario for emergency access… Continue reading
Disease may be the best metaphor for our cybersecurity status, and Security Architects Partners has recorded a webinar diagnosing possible cures. With some special guests, we covered core prevention mechanisms, smart deception techniques to turn the tables… Continue reading
As we looked into the topic of core defense in a recent series of blog posts and discussions, we concluded that privileged account management (PAM) technologies would be of great value in protecting the most sensitive IT assets… Continue reading
Concerning Sony, Sanjay Tandon writes that, “in all likelihood, what happened here is that malicious perpetrators gained administrative access within Sony’s network, and used it to obtain access to whatever they wished to obtain access.” In his Cyber… Continue reading