Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
Recent Posts by JD Sherry:
by JD Sherry, on Feb 15, 2023
The concept behind Zero Trust is simple. When you’re designing security, as Forrester alum and concept founder John Kindervag says, “never trust, always verify.” In practice, that means giving users just what they need, when they need it, and nothing more. That sounds great. So, why hasn’t everyone committed to …
Read Storyby JD Sherry, on Feb 05, 2023
Most information security professionals are fundamentally aware of the Principle of Least Privilege (PoLP): When you’re assigning access, give users what they need, only as long as they need it. Don’t give more. Just give them Just-in-Time access (JITA). It’s an easy case to make: Implement the Principle of Least …
Read Storyby JD Sherry, on Apr 01, 2021
Privileged Access Management (PAM) isn’t easy. Even when you do it right, things can be very bumpy. There’s a solid idea behind PAM: Be really careful who gets privileged access. Monitor sessions. Vault login credentials. But, what about who keeps that privileged access? What happens when they don’t need it—or …
Read Storyby JD Sherry, on Mar 22, 2021
As various strains of ransomware continue to manifest themselves across the world’s networks, next-generation defenses are being procured and deployed rapidly, just to keep pace with today’s “new normal.” Most often, organizations are migrating toward Endpoint Detection and Response (EDR) technologies. They use these in one of two ways: to …
Read Storyby JD Sherry, on Feb 10, 2021
When I’m out in the field and Privileged Access Management (PAM) comes up, I usually see that people fall into one of three camps: People who now want a PAM solution because they’ve been breached People who already have a PAM solution that wonder how they can improve their program …
Read Storyby JD Sherry, on Dec 18, 2020
Ransomware keeps us up at night. It’s the worst-case scenario that hits companies where it hurts—their data. Ransomware locks us out of our data as the attackers threaten to destroy it, or worse, publish it if they don’t get paid their ransom for the decryption key. In 2021, we envision …
Read Storyby JD Sherry, on May 03, 2019
For avid Game of Thrones* fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark’s castle in Winterfell. Daenerys Targaryen, Jon Snow and Tyrion Lannister worked to develop a strategy meant to protect Winterfell and the realm against the threat …
Read Storyby JD Sherry, on Mar 25, 2019
Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had …
Read Story