Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
Recent Posts by Tim Keeler:
by Tim Keeler, on Jun 20, 2022
Session recording has traditionally been considered one of the core capabilities of a mature Privilege Access Management implementation. The idea is novel - an administrator logs into a jump box/bastion host and that system brokers a connection to the system you're attempting to access. During this "session" it records the …
Read Storyby Tim Keeler, on Jun 05, 2021
We’ve all watched those movies … the ones with the eye-rolling assumptions that film writers and directors sometimes make about IT security. They show hackers in a dark room, their faces dimly lit by their monitors. They type plain-English commands onto a dark computer screen, stare intently at their work, …
Read Storyby Tim Keeler, on Dec 15, 2020
I wanted to share my thoughts on the SolarWinds attack that has been used to target government agencies as well as other private/public companies. FireEye has an excellent write-up ( Highly Evasive Attacker Leverages SolarWinds Supply Chain to CompromiseMultiple Global Victims With SUNBURST Backdoor ) and I encourage everyone to …
Read Storyby Tim Keeler, on Jun 23, 2020
The recent cyber campaign targeting Australian government networks should not come as a surprise to cyber security experts. The heavy use of spear-phishing for intrusion, credential harvesting for privilege escalation and lateral movement is in every adversary’s playbook. What is important to note is one’s exposure to this type of …
Read Storyby Tim Keeler, on May 18, 2017
Calling All Cyber Unicorns… In light of the recent events with the latest global outbreak of ransomware spreading across the digital globe, I wanted to take a few moments and acknowledge the tremendous amount of effort going on within all organizations currently impacted with this outbreak. Having been involved in …
Read Storyby Tim Keeler, on Feb 25, 2016
Remediant is working with NIST in the National Cybersecurity Center of Excellence Privileged Account Management for the Financial Services Sector Use Case Consortium to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex Information Technology (IT) systems. By accelerating the dissemination and use of these integrated tools …
Read Storyby Tim Keeler, on Feb 25, 2016
Last week LANDESK was the latest company to join the ever-growing list of enterprises breached. As one of the titans of IT Asset Management, this breach is particularly painful - LANDESK’s core product set is focused on protecting IT assets. As reports indicate that LANDESK’s source code/build servers have been compromised, …
Read Storyby Tim Keeler, on Feb 25, 2016
Remediant founders Tim Keeler and Paul Lanzi were invited to Pentester Academy on Feb 1, 2018, to talk about the problems with current privileged access products in the market, the solution they implemented at Lockheed Martin, and the reasons why they developed SecureONE. The full presentation is now available for viewing online. View Now. Request …
Read Story