Archive for: March 2019

The Growing Bot Army Creates Identity Management Challenges

If you think about it, humans spend a lot of time each day proving they’re not bots. We have to decipher the letters and numbers in a Captcha, choose the pictures that contain a bicycle, or simply check a box that says, “I am not a robot.” How did we get to this point? According to Oracle Dyn, bot...

Are You Taking Full Advantage of Threat Intelligence?

Threat intelligence is more than just information. Threat intelligence is evidence-based knowledge about threat actors, the motivation behind an attack, the systems being targeted, the method of attack, and the risk created by the threat. When this data is researched, vetted, analyzed, and put into proper context, it helps organizations detect and respond to known and unknown threats more...

Privilege Escalation Vulnerabilities Create Critical Security Threats

Privilege Escalation
A Google search of “privilege escalation” yields numerous articles about software bugs that hackers could exploit to gain elevated access to IT resources. In the past few months, Microsoft alone has released software updates that address two serious privilege escalation threats. In July 2018, security researchers reported a vulnerability in the Microsoft .NET Framework that could allow an attacker...

Kerberoasting: A Real Threat of Mythological Proportions

Kerberoasting
In Greek mythology, Kerberos (also spelled Cerberus) is the three-headed hound who guards the gates of Hades. Kerberos also has a snake for a tail, snakes protruding from his body, and eyes that flash fire. He’s not the sort of creature one would want to encounter. That’s why computer scientists at MIT chose the name Kerberos for a network...

How to Overcome the Challenges of Implementing Multifactor Authentication

MFA
A recent CTE Research survey confirmed what is already widely known: weak passwords continue to be a serious problem that most organizations haven’t done enough to address. The survey found that about four out of five data breaches involve weak or stolen passwords. Nearly half (47 percent) of survey respondents believe their company’s employees use simple or weak passwords,...

PAM in 2019: Organizations Need Greater Visibility and More Granular Control

PAM 2019
Gartner’s Identity and Access Management (IAM) Summit was held Dec. 3-5 in Las Vegas, giving security pros an opportunity to discuss how the IAM landscape is evolving. Not surprisingly, privileged access management (PAM) was a focal point of the event. Organizations are struggling to implement effective PAM processes in light of growing numbers of users and devices, both internal...