Tag Archives for " privilege "

How PAM Helps Protect Big Data

(by Derek A Smith, Nov 2017)  Big data analytics is a series of methods used to examine massive amounts of data, with the aim of uncovering hidden patterns, correlations, and other insights. With currennt technology, it’s possible to analyze data and get answers from it almost immediately. Although “big data” seems to have only gained […]

Continue ...

WADA Hack – Fancy Bears out for Glory

Sure, no law has been broken. However, I’m sure WADA (and some other leading athletes world-wide – the list gets longer by the day) didn’t want to have this informationleaking out to public knowledge. And so we’ve come to learn about the above information as a result of a hack done by a group referred […]

Continue ...

Eight Ways to Make Your Privileged Password Management Strategy Successful

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do so many data breaches tie back to improper use of credentials? In fact, according to the 2016 Verizon Data Breach Investigations Report, legitimate user credentials were used in most data breaches, […]

Continue ...

Data Security – An inside(r) story

As they are getting more and more information, Morgan Stanley’s management team understand that about 10% of their customers base have been leaked out, and is completely out of their hands. As the story unfolds, it becomes clearer that the employee has been taking advantage of a system flaw that allowed him to get through […]

Continue ...

Threat Analytics – The Game of Weeds

In a previous blog post, I outlined the threat of attack by exploitation of weak links— attack vectors insignificant enough to pop up on the radar, but exploitable enough to move an attacker one step further into your organization. It’s a little like playing a board game. You don’t move from one end of the […]

Continue ...

Sudo – It Doesn’t Have to be so Difficult

Sudo is an application for Unix and Linux operating systems that allows users to run programs with the security privileges of another user. In its basic form, it is by definition a least privilege application for controlling privileged access management. By default, sudo runs all elevated commands as ‘superuser.’ Modern versions of sudo have support […]

Continue ...

Giving up Your Roots: A Root Remedy Checklist

As an IT organization, should you be concerned that your sysAdmins login as root, su to root, or sudo su to root? If so, can you really expect your users to do their daily tasks if they cannot logon with root level administrative permissions? Even if you enable your most trusted admins with root, shared […]

Continue ...

Securing Your Remote Access Solution with Better Enterprise Password Security

Brad Hibbert – May 4th, 2016.  Remote access solutions provide the ability to manage computer systems from a remote location. When properly deployed, these solutions – like TeamViewer, LogMeIn, or others – provide significant benefits and cost-savings to organizations and managed service providers alike. As well, they allow companies to provide remote support in distributed […]

Continue ...