Archive for: July 2019

Why Ongoing Management and Analytics Should Be Part of Your PAM Strategy

Privileged access management (PAM) has become an essential part of effective cybersecurity. In its first Magic Quadrant for Privileged Access Management, published on Dec. 3, 2018, Gartner made the necessity for PAM clear: “Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.” PAM solutions such as CyberArk’s Core Privileged Access Security...

Four Best Practices for Effective Privileged Access Management

Compromised credentials play a role in the vast majority of security breaches. Attackers can’t easily get around modern security mechanisms, so they take the easy way out and steal credentials to get into the network. Ideally, an attacker wants to get privileged credentials, either directly or by moving laterally through the network after gaining low-level access. Privileged credentials allow...

Phishing Attacks Are on the Rise. Another Good Reason to Restrict Local Admin Rights.

Phishing attacks continue to be a preferred method of hackers, according to the fifth annual State of the Phish Report. Of the nearly 15,000 cybersecurity professionals surveyed for the report, 83 percent said their organizations experienced phishing attacks in 2018, up from 76 percent in 2017. Traditionally, hackers have used phishing attacks to distribute ransomware and other malware. In...