Contact Us
Get a Demo
Menu
Contact Us
Get a Demo
Blog-hero

Remediant Blog

Stay up to date with thought-leading expertise

by David Levine, on Apr 26, 2022

A common attack method used today is known as Supply-Chain Attack. A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in their supply chain. Supply-Chain Attacks may not attack your company directly; however, an attack on your organization thru your supply chain …

Read Story

by David Levine, on Apr 05, 2022

Unfortunately for the security industry, this is the second time this month that I am writing about a highly publicized incident that has taken place using elevated credentials and lateral movement. This time the attack was against the identity platform OKTA. I am saddened by these attacks on many levels, …

Read Story

by Paul Lanzi, on Mar 01, 2022

To set the stage, we need to way back – to Pakistan in 1986. A computer store in Lahore played host to the creation of the first PC computer virus: Brain. Two brothers who ran the computer store created the Brain boot sector virus to discourage people who were illegally …

Read Story

by Raj Dodhiawala, on Jan 20, 2022

Remediant had a breakthrough 2021. The year was highlighted by measurable growth in subscription ARR, an enviable net customer retention rate, several industry-first product innovations and the Honorable Mention in the Gartner Magic Quadrant for PAM. New Customers: Our New Subscription ARR grew by 100% over the previous year. More …

Read Story

by Raj Dodhiawala, on Jan 05, 2022

Modeling Privilege Access Sprawl for Zero Trust Security A privilege sprawl occurs when privileges, or special rights to a system, have been granted to too many people. It’s a best-case scenario for cyberattackers. When privilege sprawl gets out of hand, an organization’s attack surface grows and becomes a pain point …

Read Story

by Brian Hanrahan, on Dec 03, 2021

In the first installment of this two-part blog series, I highlighted a blind spot in many incident response plans that allows attackers to regain a foothold even after they’ve been contained following a breach. In this final installment of the blog series, the focus will be on two key tactics …

Read Story

by Brian Hanrahan, on Nov 23, 2021

It takes just a moment to see that your privileged access controls have been breached. But, after you realize that your IT systems are compromised, you face an incident response process that could last many months. In this two-part blog series, we discuss that the key to effective remediation starts …

Read Story

by Sam Kumarsamy, on Sep 13, 2021

With summer behind us, I couldn’t be more thrilled than to announce the release of our v2.12 SecureONE platform update. With this month's release, Remediant leads the industry in providing Privileged Access Risk dashboards for executives and security practitioners. These dashboards help organizations to visualize, analyze, and reduce their privileged …

Read Story

Looking for more ways to stay up to date?

Follow us on social

Subscribe to Updates