The Twitter Hack – My 3 Takeaways

By Stephen Burgio July 21, 2020

Today, it’s rare that an attack on public figures is carried out before company defenders are able to mount a response. Typically, an announcement is made that X company experienced an incident,...
Continue Reading

Key learnings from the Australian Government Breach

By Tim Keeler June 23, 2020

The recent cyber campaign targeting Australian government networks should not come as a surprise to cyber security experts. The heavy use of spear-phishing for intrusion, credential harvesting for...
Continue Reading

Introducing Zero Standing Privilege

By Mahesh Babu May 12, 2020

If we agree that standing privilege is defined as that accounts have persistent privilege access for all time on some set of systems. Zero standing privilege is the exact opposite. It is the...
Continue Reading

Usability in Security Products

By Mahesh Babu May 06, 2020

Usability ensures more deployment of a security tool, adoption by those the security tool is trying to protect and usage by the security teams administering the tool. This, in turn, ensures more...
Continue Reading

Remediant SecureONE

Agent-less, vault-less, and never shared.
Learn More

Looking for more ways to stay up to date?

Follow us on social