Quantcast
Channel: IT Security Best Practices – Identity Week
Browsing all 92 articles
Browse latest View live

Identity Management and Orphaned User Accounts

One of the most common mistakes that IT groups continue to make is to not properly manage user accounts when employees leave the organization. By finding and disabling inactive, orphaned user accounts,...

View Article



Rogue IT Administrators: The Insider Threat

Do you have a rogue IT administrator? It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you...

View Article

Common Sense, Not Always So Common When It Comes to Data Breaches

We’ve all heard the stories of major data breaches caused by malicious outsiders and disgruntled employees looking for revenge.  We also know that many malicious attacks are driven by insiders.  But,...

View Article

IT Security 101: Prevent Weak Passwords

Passwords have been part of IT since long before the age of the desktop PC. However, now more than ever, systems administrators need to re-examine their password security policies to remain effective...

View Article

Compartmentalizing and Segmenting Privileged Passwords

If you’re a fan of old war movies – and especially if you’re a child of the Cold War – then you no doubt recall watching scenes where prior to launching a nuclear missile, two operators will turn their...

View Article


The Evernote Data Breach and Securing Access to Your Systems

From a self-serving point of view, I could say that the Evernote breach shows why organizations should purchase our privileged account management product - because it regularly changes the passwords...

View Article

Defending Against Nation-State Cyber Attacks

If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen...

View Article

Would You Bet $100 That You Won’t Suffer a Data Breach in the Next 6 Months?

Why the pessimistic attitude among IT security folks? One assumption is because they realize that vendors of traditional security tools like firewalls and anti-virus are in an almost constant state of...

View Article


Cybersecurity Trends: a Q&A

The most dangerous threats are highly personalized attacks using custom developed software designed for one-time use against a specific individual. Using inexpensive and plentiful labor, as well as...

View Article


Most IT Pros Don’t Report Their Colleagues When They Catch Them Misbehaving

According to data we’ve sifted from our survey of attendees at RSA Conference 2013, 45% of IT workers have snitched on co-workers they’ve caught breaking corporate IT rules or accessing sensitive...

View Article

Security that Scales

For a long time we have been beating the drum about how automation is the only way to get control over the powerful privileged identities in the enterprise. Our assertion has always been that every...

View Article

Data Security in the Cloud: a Q&A

Lately there's been a lot of talk about the federal government's rights and abilities to access data stored in the cloud. For more insight, we took the matter to Philip Lieberman. Phil is President and...

View Article

How Are Today’s IT Professionals Managing Privileged Accounts?

To gain a better understanding of what IT shops are doing to get a grip on their powerful privileged accounts, we polled attendees of the recent Microsoft TechEd 2013 Conference. We asked - “What has...

View Article


Don’t Let Your Data Be Held Hostage by a Cloud Provider: a Q&A

In our latest series of Q&As with IdentityWeek (IW) Editor-in-Chief/Lieberman Software CEO Philip Lieberman (PL), we turn again to the topic of the cloud. This time, we ask Mr. Lieberman about the...

View Article

The Race Is On for Securing Critical National Infrastructure

Over the last year my company has been working on managing ever larger customer environments including some that require taking our auto-discovery of privileged accounts to the “next level”....

View Article


5 Ways to Advance Your IT Security Career

Unemployment figures seem to be falling slightly, but the job market is still tight and few people are changing positions. This makes both securing a new job and climbing the corporate ladder difficult...

View Article

Are Hackers Targeting Your Help Desk?

A recent whitepaper from the SANS Institute and RSA Security reports that the corporate Help Desk is now a prime target for hackers. As veterans in the Privileged Identity Management marketplace, we've...

View Article


Cyber Attacks Are Automated – Should Your Security Be Too?

Those who seek to compromise your security are using automation to find resources and access available to them. The only solution is to be even more automated than your attackers by identifying holes...

View Article

Corporate Executives Lack Confidence in Information Security

Investments in security for technology, people and processes have been meager, at best, in most organization for many years. With an eye on ROI rather than maintaining business continuity (although I...

View Article

A Street Car Named Google

On the most basic level, Viewfinity allows you to lock your doors (Privilege Management), and only give the keys to the people of your choosing (Application Control/Whitelisting). Lieberman Software...

View Article
Browsing all 92 articles
Browse latest View live




Latest Images