Privileged access management (PAM) — also referred to as privileged account management — is the top cybersecurity project for chief information security officers (CISOs), according to Gartner. Why? Because privileged access carries significant risk, and all organizations deal with privileged, administrative or other sensitive accounts. These accounts are primary targets…
Read More
Chief information security officers (CISOs) and other security leaders have heard the term darknet — and typically avoid it with good reason. When used carefully and securely, however, it is an invaluable source of threat intelligence data. But what’s really available under the surface of obvious online resources? How do…
Read More
When asked recently how my role as a graduate security architect within cloud security services was going, my response was, “Really good! Working on a new bid. Wish I could tell you who the client is, but…” — pretending to be the successful big-shot businesswoman that I’m not quite yet.…
Read More
Face it, insider threats happen. And odds are you are suffering a data loss, leak or theft even as you read this article. That’s a scary thought. Unfortunately, insider threats are so common that organizations deal every day with data loss events when employees quit, mergers and acquisitions (M&As) are…
Read More