Blog
Get a Demo
Contact Us
Get a Demo
Menu
Contact Us
Blog
Get a Demo
Blog-hero K light

Remediant in the News

How to Get Cybersecurity Insurance (and Keep Costs as Low as Possible)

Inc.
April 8, 2022
Most companies have cybersecurity insurance to help offset the damage of an attack. Even if you’ve secured a policy, keeping it is not always a given. In this Inc. Magazine piece, Remediant, Inc.'sRaj Dodhiawala discusses how to qualify for coverage and keep premiums as low as possible.
Read Article →

“Just in time:” How companies prevent privileged access cyber attacks

Cybersecurity Insiders
April 8, 2022
Imagine you’re the manager of a hotel. Your position entitles you to a master key to all the hotel rooms, with access to any room, at any point in time. This of course comes with the territory and assigned role, enables ease of operations, and is demonstrative of the inherent trust that is conferred to you as the person in charge.
Read Article →

Biden increases the budget for cybersecurity, but is it enough?

Washington Examiner
April 7, 2022

While the budget increase is a positive step, the Biden administration should focus more on sharing information between government agencies and private companies and promote zero trust, said Raj Dodhiawala, president of Remediant , a cybersecurity vendor focused on zero-trust efforts. He recommended that private companies also look for ways to work more proactively with federal efforts.
Read Article →

Opinion: Companies can make one simple change as fears of Russian cyberattacks intensify

MarketWatch
March 11, 2022

Multinationals and large government agencies are obvious targets for cyber attacks, but a low profile is no safeguard if your company doesn’t have privilege sprawl under control. In MarketWatch, Raj Dodhiawala discusses a simple strategy to protect your company’s crown jewels from hackers.

Read Article →

CISO Checklist for Offboarding Security Staff

Dark Reading
February 28, 2022
The Great Resignation strikes cybersecurity teams, too. Here's a checklist for CISOs to ensure security is retained even when security staff is not. Raj Dodhiawala offers his suggestions on what CISOs should be prepared for.

Read Article →

3 Questions CEOs Should Ask Their Cyber Chiefs

Chief Executive
February 25, 2022
The question is not if you’ll be attacked by hackers or ransomware — but when. InChief Executive, Raj Dodhiawala outlines three questions boards should be asking their cyber chiefs to ensure effective risk prevention is in place.

Read Article →

Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns

Dark Reading
February 16, 2022
Remediant's very own, Timothy Keeler was recently asked about the latest #CISA alert means. Read Jaikumar Vijayan's latest Dark Reading article to learn more.

Read Article →

White House OMB Zero Trust Strategy

Information Security Buzz
January 27, 2022

Raj Dodhiawala shared his thoughts with Information Security Buzz on White House’s Office of Management and Budget (OMB) Federal strategy to move the U.S. Government toward a “zero trust” approach to cybersecurity.

Read Article →

White House Publishes Federal Zero Trust Strategy

SecurityWeek
January 27, 2022

At the end of January 2022, the White House released its federal zero trust strategy, requiring agencies to meet certain cybersecurity standards and objectives by the end of fiscal year 2024. Remediant President, Raj Dodhiawala offers his candid insights about the order and where it may be falling short and what is needed to fill those gaps.

Read Article →

"New CIO or Head of IT? Make a Fast, Positive Impact with Identity" by Paul Lanzi, Remediant COO & Co-Founder

Identity Defined Security Alliance
December 16, 2020

On any given day, the person running IT’s real job is: PPS—professional problem solver. The set of problems they’re tasked with solving changes every day: increase business process efficiency through automation; facilitate software development and release through DevOps principles; maintain and enhance security. Against this landscape, CIOs also have another challenge: to surprise and delight their users. Easy, right?

Read Article →

Cybercriminals Aim BEC Attacks at Education Industry

Dark Reading
October 29, 2020

Heightened vulnerability comes at a time when the sector has been focusing on setting up a remote workforce and online learning amid the pandemic.

Read Article →

Remediant's B2B Cybersecurity Tech Arrives On CyberXchange

pymnts.com
October 23, 2020

Privileged access management (PAM) software provider Remediant has unveiled “immediate availability” of its SecureONE technology through the CyberXchange digital cybersecurity and compliance marketplace, according to an announcement.

Read Article →

Safety Detective’s Aviva Zacks Interviews Tim Keeler

Safety Detective
June 14, 2020


Tim Keeler, Founder and CEO of Remediant, sits down with Safety Detective’s Aviva Zacks, cybersecurity expert and writer. He told her what motivated him and his co-founder, Paul Lanzi, to start their own company.

Read the Full Interview →

Report on Patient Privacy Volume 20, Number 6

Cosmos
June 22, 2020


Health care entities still trying to adapt to the “new normal” and come to grips with cyberthreats in the shadow of the ongoing COVID-19 pandemic are finding that those threats—many from well-organized international actors—are evolving rapidly and escalating.

Still, there’s good news mixed in: The increase in threats appears to have led to an increase in threat response activities, said Tim Keeler, founder and CEO of Remediant.

Read the Full Article →

Byron Acohido – Protecting K-12 Remote Classes

Avast Blog
June 22, 2020


Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.  Now, COVID-19 has dramatically and permanently expanded that parental responsibility, as well as extended it to ill-prepared school officials in K-12 campuses all across the nation. The prospect of remotely-taught lessons remaining widespread for some time to come has profound privacy and cybersecurity implications, going forward.

Pulitzer-winning journalist Byron V. Acohido, founder of The Last Watchdog on Privacy & Security, discussed this with Tim Keeler, co-founder and CEO of Remediant.

Read Full Post →

Unraveling The Marriott Breach & Examining Credential Theft Attacks

Cyber Security Magazine
May 27, 2020

 

Based on known attacker patterns (as well as what transpired in the prior Marriott breach), the next step in the attack would be a convincing spear phishing campaign on the compromised guests. The goal of the campaign would be to gain access or deliver malware into a guest / victim’s business device. From there, attackers would use the access to create a backdoor into the victim’s company network by (1) finding the administrator accounts that have standing access to the victim’s workstation (e.g., IT admins, helpdesk) and (2) using Mimikatz to dump the password or password hash of those accounts to pivot into other systems on the company network that account might have access to

Read the Full Article →

Standing Privilege: The Attacker's Advantage

Dark Reading
May 27, 2020
 
The credential has become a hot commodity for hackers, with 74% of breached organizations admitting the breach involved access to a privileged account. In fact, the "Verizon Data Breach Investigations Report" (DBIR) found that out of all attacks, 29% of total breaches involved the use of stolen credentials, second only to phishing.
 
Once a credential is compromised, privileged access management solutions are rendered useless.


Read the Article →

Looking for more ways to stay up to date?

Follow us on social

Remediant SecureONE

See first hand how to stop lateral movement & prevent ransomware attacks by removing 24x7 admin access.