Remediant Blog

Securing Innovation

Why Top Industry Analysts View PAM as a Top Priority for 2019 and Beyond

Privileged access management (PAM) has been around for over 20 years and has been widely adopted by enterprises, but we still hear of data breaches almost every week. How are attackers getting around PAM? The answer is simple: stolen admin credentials.

Read more

The Privileged Access That Was Promised

For avid Game of Thrones fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark's castle in Winterfell. You might be asking yourself, “What does Game of Thrones have to do with privileged access management and data breaches?” We see many parallels. Find out how you can protect your network against the army of insider threats.

Read more

5 Big Benefits the New NIST Cybersecurity Practice Guide SP 1800-18 is Bringing to the Financial Services Industry

The National Cybersecurity Center of Excellence (NCCoE) is just out with a draft of its NIST Special Publication 1800-18 Privileged Account Management for the Financial Services Sector. Remediant was honored to be among the few companies NCCoE tapped to help draft the new guidelines. But the benefits will extend to the entire financial services industry. Let’s take a look at five big reasons this is the case.

Read more

PAM Security Awareness at this year's RSA...and Beyond

Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had been breached. Here’s my 2 cents on how to enhance that focus on the PAM areas most in need of attention and reform.

Read more

Identity Management v/s Access Management: What’s the Difference?

Do you know what the difference between Identity and Access Management is? Here is where the confusion arises. Therefore we have differentiated the difference between identity and access management; let’s have a look on it.

Read more

Challenges & Benefits of Building Multifactor Authentication Solutions

Multifactor authentication (MFA) is a security process that requires more than one method of authentication to ensure the security of your privileged users, but it's not necessarily easy to create. Have a look at some important motivations of those companies that are using multi-factor authentication.

Read more

Lockheed Martin and Remediant partner to protect sensitive information

Lockheed needed a solution that combined multi-factor authentication and dynamic access privileges, and needed a solution that wouldn't compromise security, nor slow down their speed of innovation.

Read more

Tim Keeler interviewed by Patrick Gray

Earlier this week, our own Tim Keeler had a chance to chat with Patrick Gray, host of the award-winning podcast Risky Business...

Read more

Talent Arms Race

Calling All Cyber Unicorns...

Read more

Can't Hire? Higher Automation.

Cybersecurity staffing faces a crisis today. There are two jobs for every qualified person, according to IBM's Security Intelligence.

Read more

Older Posts