Identity Management and Orphaned User Accounts
One of the most common mistakes that IT groups continue to make is to not properly manage user accounts when employees leave the organization. By finding and disabling inactive, orphaned user accounts,...
View ArticleRogue IT Administrators: The Insider Threat
Do you have a rogue IT administrator? It seems that stories of employees ‘going rogue’ are always in the press – but how can companies stop them before they make the headlines? Do you even know if you...
View ArticleCommon Sense, Not Always So Common When It Comes to Data Breaches
We’ve all heard the stories of major data breaches caused by malicious outsiders and disgruntled employees looking for revenge. We also know that many malicious attacks are driven by insiders. But,...
View ArticleIT Security 101: Prevent Weak Passwords
Passwords have been part of IT since long before the age of the desktop PC. However, now more than ever, systems administrators need to re-examine their password security policies to remain effective...
View ArticleCompartmentalizing and Segmenting Privileged Passwords
If you’re a fan of old war movies – and especially if you’re a child of the Cold War – then you no doubt recall watching scenes where prior to launching a nuclear missile, two operators will turn their...
View ArticleThe Evernote Data Breach and Securing Access to Your Systems
From a self-serving point of view, I could say that the Evernote breach shows why organizations should purchase our privileged account management product - because it regularly changes the passwords...
View ArticleDefending Against Nation-State Cyber Attacks
If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen...
View ArticleWould You Bet $100 That You Won’t Suffer a Data Breach in the Next 6 Months?
Why the pessimistic attitude among IT security folks? One assumption is because they realize that vendors of traditional security tools like firewalls and anti-virus are in an almost constant state of...
View ArticleCybersecurity Trends: a Q&A
The most dangerous threats are highly personalized attacks using custom developed software designed for one-time use against a specific individual. Using inexpensive and plentiful labor, as well as...
View ArticleMost IT Pros Don’t Report Their Colleagues When They Catch Them Misbehaving
According to data we’ve sifted from our survey of attendees at RSA Conference 2013, 45% of IT workers have snitched on co-workers they’ve caught breaking corporate IT rules or accessing sensitive...
View ArticleSecurity that Scales
For a long time we have been beating the drum about how automation is the only way to get control over the powerful privileged identities in the enterprise. Our assertion has always been that every...
View ArticleData Security in the Cloud: a Q&A
Lately there's been a lot of talk about the federal government's rights and abilities to access data stored in the cloud. For more insight, we took the matter to Philip Lieberman. Phil is President and...
View ArticleHow Are Today’s IT Professionals Managing Privileged Accounts?
To gain a better understanding of what IT shops are doing to get a grip on their powerful privileged accounts, we polled attendees of the recent Microsoft TechEd 2013 Conference. We asked - “What has...
View ArticleDon’t Let Your Data Be Held Hostage by a Cloud Provider: a Q&A
In our latest series of Q&As with IdentityWeek (IW) Editor-in-Chief/Lieberman Software CEO Philip Lieberman (PL), we turn again to the topic of the cloud. This time, we ask Mr. Lieberman about the...
View ArticleThe Race Is On for Securing Critical National Infrastructure
Over the last year my company has been working on managing ever larger customer environments including some that require taking our auto-discovery of privileged accounts to the “next level”....
View Article5 Ways to Advance Your IT Security Career
Unemployment figures seem to be falling slightly, but the job market is still tight and few people are changing positions. This makes both securing a new job and climbing the corporate ladder difficult...
View ArticleAre Hackers Targeting Your Help Desk?
A recent whitepaper from the SANS Institute and RSA Security reports that the corporate Help Desk is now a prime target for hackers. As veterans in the Privileged Identity Management marketplace, we've...
View ArticleCyber Attacks Are Automated – Should Your Security Be Too?
Those who seek to compromise your security are using automation to find resources and access available to them. The only solution is to be even more automated than your attackers by identifying holes...
View ArticleCorporate Executives Lack Confidence in Information Security
Investments in security for technology, people and processes have been meager, at best, in most organization for many years. With an eye on ROI rather than maintaining business continuity (although I...
View ArticleA Street Car Named Google
On the most basic level, Viewfinity allows you to lock your doors (Privilege Management), and only give the keys to the people of your choosing (Application Control/Whitelisting). Lieberman Software...
View Article
More Pages to Explore .....