On any given day, the person running IT’s real job is: PPS—professional problem solver. The set of problems they’re tasked with solving changes every day: increase business process efficiency through automation; facilitate software development and release through DevOps principles; maintain and enhance security. Against this landscape, CIOs also have another challenge: to surprise and delight their users. Easy, right?
Heightened vulnerability comes at a time when the sector has been focusing on setting up a remote workforce and online learning amid the pandemic.
Privileged access management (PAM) software provider Remediant has unveiled “immediate availability” of its SecureONE technology through the CyberXchange digital cybersecurity and compliance marketplace, according to an announcement.
Tim Keeler, Founder and CEO of Remediant, sits down with Safety Detective’s Aviva Zacks, cybersecurity expert and writer. He told her what motivated him and his co-founder, Paul Lanzi, to start their own company.
Health care entities still trying to adapt to the “new normal” and come to grips with cyberthreats in the shadow of the ongoing COVID-19 pandemic are finding that those threats—many from well-organized international actors—are evolving rapidly and escalating.
Still, there’s good news mixed in: The increase in threats appears to have led to an increase in threat response activities, said Tim Keeler, founder and CEO of Remediant.
Parents have long held a special duty to protect their school-aged children from bad actors on the Internet. Now, COVID-19 has dramatically and permanently expanded that parental responsibility, as well as extended it to ill-prepared school officials in K-12 campuses all across the nation. The prospect of remotely-taught lessons remaining widespread for some time to come has profound privacy and cybersecurity implications, going forward.
Pulitzer-winning journalist Byron V. Acohido, founder of The Last Watchdog on Privacy & Security, discussed this with Tim Keeler, co-founder and CEO of Remediant.
Based on known attacker patterns (as well as what transpired in the prior Marriott breach), the next step in the attack would be a convincing spear phishing campaign on the compromised guests. The goal of the campaign would be to gain access or deliver malware into a guest / victim’s business device. From there, attackers would use the access to create a backdoor into the victim’s company network by (1) finding the administrator accounts that have standing access to the victim’s workstation (e.g., IT admins, helpdesk) and (2) using Mimikatz to dump the password or password hash of those accounts to pivot into other systems on the company network that account might have access to
Follow us on social
Precision Privileged Access Management: The right access at the right time, across every workload.
Interested in a 30 day free trial?