How to Design a PAM Break Glass Process
Work with clients on a privileged account management (PAM) system design and you’ll soon need a PAM break glass process for emergency access when normal paths to the password, or secrets vault break down. You’ll find it an interesting balancing… Continue reading
Encryption Probably Wouldn’t Have Prevented the Anthem Breach
Anthem’s announcement of a breach to 80 million customer medical identity records in early February motivates an update to my After the Breach series and my 10-year U.S. breach table. The series is also morphing into… Continue reading
Lateral Movement: There’s No Patch for Privilege Escalation
In the soft underbelly of IT security I discussed what Sanjay Tandon of Paramount Defense calls the “#1 cybersecurity risk,” or privilege escalation. However, sometime after finishing the post, I realized that I hadn’t emphasized sufficiently the following key point:… Continue reading
The Soft Underbelly of IT Security
Last Thursday CEO Sanjay Tandon “declassified” the “#1 cyber security risk to Active Directory.” When Sanjay contacted me, I wondered if he’d found a new code vulnerability in Windows and whether this was going to be a responsible disclosure… Continue reading