Secure Privileged Accounts: The Shoemaker’s Children Go Barefoot
A recent New York Times article, “A Strong Password Isn’t the Strongest Security,” offers a great assessment of the complacency of many IT security professionals. The assertion that password strength...
View ArticleIT Pros Can’t Resist Peeking at Private Data
As your organization looks to wrap up the year, there is one event that seems inevitable – the office holiday party. This year, take time to really notice your merry and festive colleagues. A few of...
View ArticleAre Your Privileged Account Passwords Published Online?
If you’re not already familiar with the issue of built-in passwords, you need to be. Many hardware devices come pre-configured with default credentials that might never get changed - and are publicly...
View ArticleTop 8 Ways That Privileged Accounts Are Exploited
Large organizations typically have thousands of privileged accounts, which are often left unmanaged. Rogue insiders, former employees, criminal hackers and sophisticated state-sponsored attackers can...
View ArticleHow Are Today’s IT Professionals Managing Privileged Accounts?
To gain a better understanding of what IT shops are doing to get a grip on their powerful privileged accounts, we polled attendees of the recent Microsoft TechEd 2013 Conference. We asked - “What has...
View ArticlePrivileged Accounts, User Accounts and the Cyber Security Challenge
Essentially, the challenge for IT is having a good source of privileged account information that is continuously up to date. And they must combine that information with domain specific knowledge about...
View Article
More Pages to Explore .....