Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
by Brian Hanrahan, on Mar 20, 2023
In the first installment of this two-part blog series, I highlighted a blind spot in many incident response plans that allows attackers to regain a foothold even after they’ve been contained following a breach. In this final installment of the blog series, the focus will be on two key tactics …
Read Storyby Brian Hanrahan, on Mar 16, 2023
It takes just a moment to see that your privileged access controls have been breached. But, after you realize that your IT systems are compromised, you face an incident response process that could last many months. In this two-part blog series, we discuss that the key to effective remediation starts …
Read Storyby JD Sherry, on Feb 15, 2023
The concept behind Zero Trust is simple. When you’re designing security, as Forrester alum and concept founder John Kindervag says, “never trust, always verify.” In practice, that means giving users just what they need, when they need it, and nothing more. That sounds great. So, why hasn’t everyone committed to …
Read Storyby JD Sherry, on Feb 05, 2023
Most information security professionals are fundamentally aware of the Principle of Least Privilege (PoLP): When you’re assigning access, give users what they need, only as long as they need it. Don’t give more. Just give them Just-in-Time access (JITA). It’s an easy case to make: Implement the Principle of Least …
Read Storyby Lori Ann Kruse, on Dec 14, 2022
“It is a fairly open secret that almost all systems can be hacked, somehow,” said the famous Internet Security Researcher David Kaminsky. “It is a less spoken of secret that such hacking has gone quite mainstream.” That statement certainly rings true in the current cyber threat landscape. Global cyber attacks …
Read Storyby Remediant, on Dec 14, 2022
To all our customers, partners, and colleagues, thank you for being with our team over the years. We appreciate the privilege we've had as a company to offer technologies to help keep the market safe. From all of us at Remediant, we hope everyone has a safe, fulfilling holiday season …
Read Storyby Remediant, on Oct 27, 2022
Business expenses associated with a data breach or ransomware attack continue to rise. IBM’s 2022 Cost of a Data Breach Report found an average cost of $9.44 million in the U.S. Worldwide, another study showed the average ransom payment increased 82% from 2020 to 2021. The increase in payouts occurred …
Read Storyby Remediant, on Sep 29, 2022
Privilege access is at the heart of most organizations’ security and is an attractive attack vector that bad actors frequently target. Legacy PAM solutions provide a starting point for keeping credentials safe, but an advanced PAM strategy (i.e. a PAM+ approach), improves your security posture overall. Case in point, when …
Read Story