Blog

Why Identity Governance Is Ripe for a “Shift Left” Approach

As organizations seek to bolster security and improve the user experience, the “Shift Left” movement is gaining steam. The term actually has a number of definitions, depending on context. In software development, where it originated, Shift Left refers to an approach in which testing is done earlier in the process — that is, it is shifted left on the...

Why Risk Analytics Is an Essential Component of Modern Identity Management

Risk management is a five-step process that always starts with identification. It’s common sense; you have to determine what risks are involved before you can evaluate, prioritize, mitigate, and monitor them. With identity and access management (IAM), however, identifying risks can be a difficult process. An enterprise with 1,000 employees and 25 IT systems that each have 10 levels...

The Growing Bot Army Creates Identity Management Challenges

If you think about it, humans spend a lot of time each day proving they’re not bots. We have to decipher the letters and numbers in a Captcha, choose the pictures that contain a bicycle, or simply check a box that says, “I am not a robot.” How did we get to this point? According to Oracle Dyn, bot...

Are You Taking Full Advantage of Threat Intelligence?

Threat intelligence is more than just information. Threat intelligence is evidence-based knowledge about threat actors, the motivation behind an attack, the systems being targeted, the method of attack, and the risk created by the threat. When this data is researched, vetted, analyzed, and put into proper context, it helps organizations detect and respond to known and unknown threats more...

Privilege Escalation Vulnerabilities Create Critical Security Threats

Privilege Escalation
A Google search of “privilege escalation” yields numerous articles about software bugs that hackers could exploit to gain elevated access to IT resources. In the past few months, Microsoft alone has released software updates that address two serious privilege escalation threats. In July 2018, security researchers reported a vulnerability in the Microsoft .NET Framework that could allow an attacker...

Kerberoasting: A Real Threat of Mythological Proportions

Kerberoasting
In Greek mythology, Kerberos (also spelled Cerberus) is the three-headed hound who guards the gates of Hades. Kerberos also has a snake for a tail, snakes protruding from his body, and eyes that flash fire. He’s not the sort of creature one would want to encounter. That’s why computer scientists at MIT chose the name Kerberos for a network...

How to Overcome the Challenges of Implementing Multifactor Authentication

MFA
A recent CTE Research survey confirmed what is already widely known: weak passwords continue to be a serious problem that most organizations haven’t done enough to address. The survey found that about four out of five data breaches involve weak or stolen passwords. Nearly half (47 percent) of survey respondents believe their company’s employees use simple or weak passwords,...

PAM in 2019: Organizations Need Greater Visibility and More Granular Control

PAM 2019
Gartner’s Identity and Access Management (IAM) Summit was held Dec. 3-5 in Las Vegas, giving security pros an opportunity to discuss how the IAM landscape is evolving. Not surprisingly, privileged access management (PAM) was a focal point of the event. Organizations are struggling to implement effective PAM processes in light of growing numbers of users and devices, both internal...

How Managed Security Services Overcome the Security Skills Gap

Clango MSP
When considering cybersecurity risks, most people focus on the increasing number of sophisticated threats or the fact that hackers are constantly discovering and exploiting new vulnerabilities. However, the greatest risk could be the lack of available professionals who have the skills to implement and manage a robust cybersecurity strategy. Many IT skills are in short supply, but cybersecurity continues...

Unsecured APIs Create a Back Door into the IT Environment

API Security
The use of application programming interfaces (APIs) has exploded in recent years as organizations seek to interconnect software and share data both internally and externally. APIs define the means of communication among various applications, enabling programmers to take advantage of third-party code and break up large applications into microservices. Unfortunately, APIs can also provide hackers with a back door...