Today’s post is a pass-the-hash refresher. What it is, how it works and – most importantly – what you can do to counter it.
Ex-employees can wreak significant havoc on their former employers’ networks using the same privileged logins they had while employed. But these unfortunate affairs could be prevented – or at least significantly minimized. It starts with securing privileged access.
Senior corporate leadership must be up-to-date on cyber warfare threats and how the organization can prepare to achieve minimal losses in the case of a cyber attack.
Stolen passwords are the leading cause of hacking-related data breaches. To discuss what can be done to mitigate this security vulnerability, Identity Week spoke with Steve Tout, CEO of VeriClouds.
The security of your entire network is only as good as your least secure server. And, relegating the Unix/Linux infrastructure to a status of any lesser degree is the attack surface that hackers are looking to exploit.
Your organization has been breached. What do you do now? Philip Lieberman explains in this 4-minute Game Changers Silicon Valley interview.
Security Today sat down with noted cyber security expert Philip Lieberman to get his insights on today's top IT security challenges in this 8-minute video interview.
Based on our extensive experience we’ve identified the ways our most successful customers have started out. We distilled this into a set of best practices to help guide your Privileged Identity Management journey.
Technology can be like old clothes. There’s a level of comfort in holding onto software you’ve been using for years. But, there’s also discomfort when you outgrow its usefulness.