Why Top Industry Analysts View PAM as a Top Priority for 2019 and Beyond
Privileged access management (PAM) has been around for over 20 years and has been widely adopted by enterprises, but we still hear of data breaches almost every week. How are attackers getting around PAM? The answer is simple: stolen admin credentials.
The Privileged Access That Was Promised
For avid Game of Thrones fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark's castle in Winterfell. You might be asking yourself, “What does Game of Thrones have to do with privileged access management and data breaches?” We see many parallels. Find out how you can protect your network against the army of insider threats.
5 Big Benefits the New NIST Cybersecurity Practice Guide SP 1800-18 is Bringing to the Financial Services Industry
The National Cybersecurity Center of Excellence (NCCoE) is just out with a draft of its NIST Special Publication 1800-18 Privileged Account Management for the Financial Services Sector. Remediant was honored to be among the few companies NCCoE tapped to help draft the new guidelines. But the benefits will extend to the entire financial services industry. Let’s take a look at five big reasons this is the case.
PAM Security Awareness at this year's RSA...and Beyond
Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had been breached. Here’s my 2 cents on how to enhance that focus on the PAM areas most in need of attention and reform.
Identity Management v/s Access Management: What’s the Difference?
Do you know what the difference between Identity and Access Management is? Here is where the confusion arises. Therefore we have differentiated the difference between identity and access management; let’s have a look on it.
Challenges & Benefits of Building Multifactor Authentication Solutions
Multifactor authentication (MFA) is a security process that requires more than one method of authentication to ensure the security of your privileged users, but it's not necessarily easy to create. Have a look at some important motivations of those companies that are using multi-factor authentication.
Lockheed Martin and Remediant partner to protect sensitive information
Lockheed needed a solution that combined multi-factor authentication and dynamic access privileges, and needed a solution that wouldn't compromise security, nor slow down their speed of innovation.
Tim Keeler interviewed by Patrick Gray
Earlier this week, our own Tim Keeler had a chance to chat with Patrick Gray, host of the award-winning podcast Risky Business...
Talent Arms Race
Calling All Cyber Unicorns...
Can't Hire? Higher Automation.
Cybersecurity staffing faces a crisis today. There are two jobs for every qualified person, according to IBM's Security Intelligence.