Author Archive

General Information
User Name Clango
Fullname Clango
Member Since February 21, 2019

How Managed Security Services Overcome the Security Skills Gap

Clango MSP
When considering cybersecurity risks, most people focus on the increasing number of sophisticated threats or the fact that hackers are constantly discovering and exploiting new vulnerabilities. However, the greatest risk could be the lack of available professionals who have the skills to implement and manage a robust cybersecurity strategy. Many IT skills are in short supply, but cybersecurity continues...

Unsecured APIs Create a Back Door into the IT Environment

API Security
The use of application programming interfaces (APIs) has exploded in recent years as organizations seek to interconnect software and share data both internally and externally. APIs define the means of communication among various applications, enabling programmers to take advantage of third-party code and break up large applications into microservices. Unfortunately, APIs can also provide hackers with a back door...

Privileged Access Management and Security Are in Our DNA

CyberArk DNA
CyberArk Discovery & Audit (DNA) is a powerful tool for assessing privileged access risk. This lightweight, agentless software scans systems to locate all privileged credentials, including passwords, hashes, SSH keys, cloud access keys, and many others. By scanning their networks with CyberArk DNA, organizations can gain visibility into all of their privileged accounts across on-premises, cloud, and DevOps environments....

Integration Is Key to Maximizing the Value of Cybersecurity Investments

According to a recent survey of compliance decision makers conducted by research firm Vanson Bourne, every organization knows it needs to invest in cybersecurity tools. However, most organizations are having trouble determining where to allocate their security budget as the IT environment rapidly evolves. Not only that, but organizations aren’t doing enough to integrate their security solutions into a...

Poor PAM Practices Put Organizations at Risk

Poor PAM Practices
Most organizations recognize that theft of user credentials is one of the easiest ways for bad actors to gain entry to IT systems. Privileged accounts are especially coveted by external hackers and malicious insiders because they offer virtually limitless access to an organization’s IT infrastructure. Nevertheless, many organizations struggle to implement identity and access management (IAM) and privileged account...

Choose the Right Tool for Privileged Session Monitoring and Management

How many privileged sessions are active in your environment right now? Are you monitoring and managing all of them effectively? Many organizations attempt to use existing security tools that aren’t all that effective at detecting and blocking potentially malicious privileged activity. User and system activity is constantly logged by a variety of tools. In many environments, this information is...

Securing and Monitoring Privileged Access in the Cloud

PSM Cloud
Cloud adoption continues to increase. The cloud market is quickly maturing, and more organizations are moving critical workloads and data into the cloud. In fact, a 451 Research report found that 85 percent of enterprises have sensitive data in the cloud, up from 54 percent the prior year. However, many organizations aren’t doing enough to secure their cloud resources....

Privileged Access Management Helps Meet PCI DSS Requirements

A data breach exposing cardholder data can be devastating. In addition to the cost of breach response, notification of affected customers, legal fees, fines, and penalties, merchants face customer churn and tarnished reputations. That’s why Payment Card Industry Data Security Standard (PCI DSS) compliance is more important than ever. Though PCI DSS compliance will not prevent a security breach,...

Overcoming DevOps Challenges with CyberArk and Clango

DevOps Confide
A new study by the Ponemon Institute finds that organizations are struggling to manage their multi-cloud and hybrid cloud environments. Seventy percent of respondents say they have little to no visibility into the ownership or purpose of many of the virtual machines in the cloud, while 68 percent say they lack a single user interface into the entire cloud...

A Look Inside a Ransomware Attack

Ransomware is one of the most serious cybersecurity threats that organizations face today. According to the quarterly Cybercrime Tactics and Techniques Report from Malwarebytes Labs, the number of detected ransomware attacks on businesses increased 88 percent in the third quarter of 2018. While overall ransomware attacks have trended downward over the past year, security researchers have identified almost 40...