Archive for: January 2019

Unsecured APIs Create a Back Door into the IT Environment

API Security
The use of application programming interfaces (APIs) has exploded in recent years as organizations seek to interconnect software and share data both internally and externally. APIs define the means of communication among various applications, enabling programmers to take advantage of third-party code and break up large applications into microservices. Unfortunately, APIs can also provide hackers with a back door...

Privileged Access Management and Security Are in Our DNA

CyberArk DNA
CyberArk Discovery & Audit (DNA) is a powerful tool for assessing privileged access risk. This lightweight, agentless software scans systems to locate all privileged credentials, including passwords, hashes, SSH keys, cloud access keys, and many others. By scanning their networks with CyberArk DNA, organizations can gain visibility into all of their privileged accounts across on-premises, cloud, and DevOps environments....

Integration Is Key to Maximizing the Value of Cybersecurity Investments

CIL
According to a recent survey of compliance decision makers conducted by research firm Vanson Bourne, every organization knows it needs to invest in cybersecurity tools. However, most organizations are having trouble determining where to allocate their security budget as the IT environment rapidly evolves. Not only that, but organizations aren’t doing enough to integrate their security solutions into a...

Poor PAM Practices Put Organizations at Risk

Poor PAM Practices
Most organizations recognize that theft of user credentials is one of the easiest ways for bad actors to gain entry to IT systems. Privileged accounts are especially coveted by external hackers and malicious insiders because they offer virtually limitless access to an organization’s IT infrastructure. Nevertheless, many organizations struggle to implement identity and access management (IAM) and privileged account...

Choose the Right Tool for Privileged Session Monitoring and Management

PSM
How many privileged sessions are active in your environment right now? Are you monitoring and managing all of them effectively? Many organizations attempt to use existing security tools that aren’t all that effective at detecting and blocking potentially malicious privileged activity. User and system activity is constantly logged by a variety of tools. In many environments, this information is...

Securing and Monitoring Privileged Access in the Cloud

PSM Cloud
Cloud adoption continues to increase. The cloud market is quickly maturing, and more organizations are moving critical workloads and data into the cloud. In fact, a 451 Research report found that 85 percent of enterprises have sensitive data in the cloud, up from 54 percent the prior year. However, many organizations aren’t doing enough to secure their cloud resources....