by Brian Hanrahan, on Feb 17, 2021
This is the first of many blogs that I’ll be posting as the Director of Product Management for Remediant. Today, I’m delighted to announce some new Linux features available to …
Read Storyby JD Sherry, on Feb 10, 2021
When I’m out in the field and Privileged Access Management (PAM) comes up, I usually see that people fall into one of three camps: People who now want a PAM …
Read Storyby JD Sherry, on Jan 25, 2021
Most information security professionals are fundamentally aware of the Principle of Least Privilege (PoLP): When you’re assigning access, give users what they need, only as long as they need it …
Read Storyby JD Sherry, on Dec 18, 2020
Ransomware keeps us up at night. It’s the worst-case scenario that hits companies where it hurts—their data. Ransomware locks us out of our data as the attackers threaten to destroy …
Read Storyby Tim Keeler, on Dec 15, 2020
I wanted to share my thoughts on the SolarWinds attack that has been used to target government agencies as well as other private/public companies. FireEye has an excellent write-up ( …
Read Storyby JD Sherry, on Dec 03, 2020
The concept behind Zero Trust is simple. When you’re designing security, as Forrester alum and concept founder John Kindervag says, “never trust, always verify.” In practice, that means giving users …
Read Storyby Mahesh Babu, on Nov 17, 2020
The Marriott breach this year involved the theft of employee credentials. Specifically, attackers obtained the login credentials for two franchise property employees which gave them access to a third party guest …
Read Storyby Mahesh Babu, on Sep 09, 2020
Just-in-time administration (JIT) is a now prevalent capability in PAM solutions. Once an emerging, niche feature set, this has now propelled into a table-stakes capability for PAM vendors offered as …
Read Story