REMEDIANT IS NOW PART OF NETWRIX  READ PRESS RELEASE

Blog
Get a Demo
Contact Us
Get a Demo
Menu
Contact Us
Blog
Get a Demo
Blog-hero

Remediant Blog

Stay up to date with thought-leading expertise

JD Sherry

JD Sherry

Chief Revenue Officer

Recent Posts by JD Sherry:

by JD Sherry, on Feb 15, 2023

The concept behind Zero Trust is simple. When you’re designing security, as Forrester alum and concept founder John Kindervag says, “never trust, always verify.” In practice, that means giving users just what they need, when they need it, and nothing more. That sounds great. So, why hasn’t everyone committed to …

Read Story
Topics:Zero Standing PrivilegePrivileged Access Management (PAM)

by JD Sherry, on Feb 05, 2023

Most information security professionals are fundamentally aware of the Principle of Least Privilege (PoLP): When you’re assigning access, give users what they need, only as long as they need it. Don’t give more. Just give them Just-in-Time access (JITA). It’s an easy case to make: Implement the Principle of Least …

Read Story
Topics:SecureONEZero Standing Privilege

by JD Sherry, on Apr 01, 2021

Privileged Access Management (PAM) isn’t easy. Even when you do it right, things can be very bumpy. There’s a solid idea behind PAM: Be really careful who gets privileged access. Monitor sessions. Vault login credentials. But, what about who keeps that privileged access? What happens when they don’t need it—or …

Read Story
Topics:Privileged Access Management (PAM)

by JD Sherry, on Mar 22, 2021

As various strains of ransomware continue to manifest themselves across the world’s networks, next-generation defenses are being procured and deployed rapidly, just to keep pace with today’s “new normal.” Most often, organizations are migrating toward Endpoint Detection and Response (EDR) technologies. They use these in one of two ways: to …

Read Story
Topics:SecureONEPrivileged Access Management (PAM)

by JD Sherry, on Feb 10, 2021

When I’m out in the field and Privileged Access Management (PAM) comes up, I usually see that people fall into one of three camps: People who now want a PAM solution because they’ve been breached People who already have a PAM solution that wonder how they can improve their program …

Read Story
Topics:SecureONEPrivileged Access Management (PAM)

by JD Sherry, on Dec 18, 2020

Ransomware keeps us up at night. It’s the worst-case scenario that hits companies where it hurts—their data. Ransomware locks us out of our data as the attackers threaten to destroy it, or worse, publish it if they don’t get paid their ransom for the decryption key. In 2021, we envision …

Read Story
Topics:Cyber ThreatsZero Standing PrivilegeRansomware

by JD Sherry, on May 03, 2019

For avid Game of Thrones* fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark’s castle in Winterfell. Daenerys Targaryen, Jon Snow and Tyrion Lannister worked to develop a strategy meant to protect Winterfell and the realm against the threat …

Read Story
Topics:Privileged Access Management (PAM)

by JD Sherry, on Mar 25, 2019

Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had …

Read Story
Topics:Privileged Access Management (PAM)

Looking for more ways to stay up to date?

Follow us on social

Subscribe to Updates