Cyber Security Awareness and Vulnerabilities Blog


Improving Cybersecurity with Monitoring Solutions

When a data breach hits the headlines, questions often arise for those not familiar with cybersecurity. How did the organization not realize what was going on? Why did they ignore all the warning signs? Those more familiar with just how massive IT infrastructures…

Read More



Robotic Process Automation (RPA) is a type of automation technology currently transforming the way businesses operate. RPA software robots manipulate and communicate with business systems and applications to streamline processes and reduce the burden on employees. RPA can automate tasks, including claims processing…

Read More

Part 2 of the Improving Your Security-Efficiency Balance Series:   One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we…

Read More

Part 1 of the Improving Your Security-Efficiency Balance Series:   Organizations of all sizes today face a unique balancing act when it comes to user access. Employees require access to multiple organizational systems, applications, and data to successfully do their jobs—from human resource information systems…

Read More


With data breaches causing seemingly endless damage, from record breaking numbers of exposed records to millions spent on remediation, it’s clear that organizations must build stronger security portfolios than ever before. Security Event and Information Management (SIEM) solutions enable you to manage potential vulnerabilities proactively…

Read More


Privileged accounts exist nearly everywhere within the organizational environment. Managing and protecting these privileged accounts has led to the rise of Privileged Access Management (PAM) solutions. These tools enable companies to centralize user administration, improve controls for granting user access, and more effectively manage…

Read More



Insider threats are on the rise. Whether they come from accidental insiders who are prone to phishing attempts or malicious insiders who are seeking to expose sensitive data, insider attacks have significantly increased in recent years. According to the 2019 Insider Threat Report from…

Read More


Human element of pen testing

Science fiction novels, TV shows, and movies often demonstrate the possibility of, and perhaps the danger of, computers and machines taking over the day to day jobs that humans once completed. While this has come to fruition in some instances, like with many…

Read More


Identity Governance Improves Security

In the complicated, tangled web of managing user rights, permissions and accounts, keeping track of who has access to different resources can seem nearly impossible. Organizations today are facing increasing demands, mandates, and compliance regulations as they manage access and support countless devices…

Read More


False positive

The phrase “false positive” has become so ubiquitous in Information Security that we often don’t stop to consider what it means or how it is used. Many use the term to describe every alert generated by a tool that does not lead to…

Read More