Watch this video to learn about Zero Standing Privilege (2:08)
Watch this video to learn about Zero Standing Privilege (2:08)
Recent Posts by Tim Keeler:
by Tim Keeler, on Feb 25, 2016
Reactions to Mandiant M-Trends 2016 Report Released Today Mandiant, the breach remediation and forensics company purchased by FireEye in 2014 and a leader in the cybersecurity technology world, released their “M-Trends 2016” …
Read Storyby Tim Keeler, on Feb 25, 2016
Today, Remediant joined the likes of f5, Malwarebytes, and RSA as members of the SANS Affiliate Directory. Created in late 2016, the directory “was developed to create a more comprehensive relationship between SANS and cybersecurity vendors, …
Read Storyby Tim Keeler, on Feb 25, 2016
According to Paul Lanzi, Co-Founder and COO of Remediant, the last time something new was launched in the privileged access arena was in 1999. While the threat landscape has evolved …
Read Storyby Tim Keeler, on Feb 25, 2016
Keeping your network completely secure is an incredibly difficult task and not one you are likely to accomplish because there will always be at least one vulnerability. However, the number of …
Read Storyby Tim Keeler, on Feb 25, 2016
The more complex technology becomes, the more vulnerabilities it has. Even if you have continuous maintenance on your systems, updating them as soon as patches and updates are available, your …
Read Storyby Tim Keeler, on Feb 25, 2016
Our own Paul Lanzi spoke with Phil Simon about two-factor authentication, NIST 800-171 compliance and how Remediant is moving the needle in this space. Two-factor authentication represents one way to immediately improve nearly all …
Read Storyby Tim Keeler, on Feb 25, 2016
Admin accounts have been around for decades because they have been viewed largely as a benefit to the company, despite all of the inherent risks associated with them. As technology …
Read Storyby Tim Keeler, on Nov 30, 2015
Last week LANDESK was the latest company to join the ever-growing list of enterprises breached. As one of the titans of IT Asset Management, this breach is particularly painful - …
Read Story