Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
by David Levine, on Apr 26, 2022
A common attack method used today is known as Supply-Chain Attack. A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in their supply chain. Supply-Chain Attacks may not attack your company directly; however, an attack on your organization thru your supply chain …
Read Storyby David Levine, on Apr 05, 2022
Unfortunately for the security industry, this is the second time this month that I am writing about a highly publicized incident that has taken place using elevated credentials and lateral movement. This time the attack was against the identity platform OKTA. I am saddened by these attacks on many levels, …
Read Storyby Paul Lanzi, on Mar 01, 2022
To set the stage, we need to way back – to Pakistan in 1986. A computer store in Lahore played host to the creation of the first PC computer virus: Brain. Two brothers who ran the computer store created the Brain boot sector virus to discourage people who were illegally …
Read Storyby Raj Dodhiawala, on Jan 20, 2022
Remediant had a breakthrough 2021. The year was highlighted by measurable growth in subscription ARR, an enviable net customer retention rate, several industry-first product innovations and the Honorable Mention in the Gartner Magic Quadrant for PAM. New Customers: Our New Subscription ARR grew by 100% over the previous year. More …
Read Storyby Raj Dodhiawala, on Jan 05, 2022
Modeling Privilege Access Sprawl for Zero Trust Security A privilege sprawl occurs when privileges, or special rights to a system, have been granted to too many people. It’s a best-case scenario for cyberattackers. When privilege sprawl gets out of hand, an organization’s attack surface grows and becomes a pain point …
Read Storyby Brian Hanrahan, on Dec 03, 2021
In the first installment of this two-part blog series, I highlighted a blind spot in many incident response plans that allows attackers to regain a foothold even after they’ve been contained following a breach. In this final installment of the blog series, the focus will be on two key tactics …
Read Storyby Brian Hanrahan, on Nov 23, 2021
It takes just a moment to see that your privileged access controls have been breached. But, after you realize that your IT systems are compromised, you face an incident response process that could last many months. In this two-part blog series, we discuss that the key to effective remediation starts …
Read Storyby Sam Kumarsamy, on Sep 13, 2021
With summer behind us, I couldn’t be more thrilled than to announce the release of our v2.12 SecureONE platform update. With this month's release, Remediant leads the industry in providing Privileged Access Risk dashboards for executives and security practitioners. These dashboards help organizations to visualize, analyze, and reduce their privileged …
Read Story