Resources

Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve so carefully built up and nurtured over time with existing as well as potential customers. According to Risk...
Blog

How to Leverage a Comprehensive Privileged Access Management Security Approach

Effectively managing privileged access has become a top priority for many organizations seeking to protect their data and systems from unauthorized users. That’s because inappropriate access can expose valuable organizational data, compromise sensitive information, and adversely affect system reliability. The latest Verizon Data Breach Investigations Report found that the majority of data breaches...
Blog

How Financial Services Organizations Can Mitigate Their Top Identity-Related Access Risks

Financial services organizations face numerous challenges in a constantly changing landscape. With increased cybersecurity threats, intensified regulatory requirements, an acceleration of digital transformation, large-scale mergers and acquisitions, and growing customer expectations, these organizations must pursue strategies and programs that mitigate risks, safeguard valuable data, and protect...
Video

How Penetration Testing Reduces Risk

Though cybersecurity defenses are increasingly sophisticated, threat actors have also become more creative in order to achieve their end goals. They continue to find new ways to use the technologies most integral to businesses – mobile devices, computers, servers, websites, wifi, and email – as entry points to breach networks for malicious purposes. What more can be done to reduce the risk of...
Video

Combating Ransomware: Building a Strategy to Prevent and Detect Attacks

Forms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works. In this webinar, Bob Erdman and Sandi Moore go in-depth on the ransomware attack cycle,...
Video

The Effects of Cloud Migration on IAM, PAM, and Audit

Companies are continually reassessing which cloud infrastructures provide dynamic provisioning for their business units, using the best price points available. Many organizations are jostling between AWS, Google Cloud, and Microsoft Azure offers versus private cloud alternatives like OpenStack. Your business planning team is reviewing annually cost vs efficiencies, and procurement cycles are...
Video

What’s Lurking In Your Network? Uncovering Hidden Access Risks Before It’s Too Late

No matter how buttoned-up your organization is in its identity and access management approach, you may be overlooking one thing that poses a huge risk to your business. Hidden access. Not only does hidden access expose your organization to increased threats, but it magnifies the impact of identity-related risks throughout your entire business. In other words, what you don’t know can hurt you....
Blog

Interview with a Healthcare Security Expert: William "Buddy" Gillespie, HCISPP

In November we started a wonderful webinar series with industry leader William "Buddy" Gillespie, HCISPP and we introduced that series with a sit down interview. Yesterday, we concluded the series with a webinar titled "Healthcare 2020: Focus on the Future". While the webinar series may be over, our partnership with Buddy will continue and we would like to continue to showcase his knowledge...
Video

8 Tips for Penetration Testing

Are you testing your network for vulnerabilities? A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. Watch for 8 tips to help you get the most out of your penetration testing tool. ...
Video

Access Assurance Suite 9.2 Features and Enhancements

Version 9.2 focuses on user experience, and includes the following features: A powerful policy management engine for Core Access that enables user to easily build user access policies based on the following types: Segregation of Duties (SoD) Privileged access Sensitive access Redesign of the Manage Access and View Requests pages to enhance usability and display additional information...
Blog

10 Reasons to Pen-Test Your Network

Are you using penetration testing in your cyber-security tool kit? Why not?! Penetration testing, or pen-testing, is one of the most important tools to not only find the holes in your network but to prioritize them for remediation. Keep reading for the 10 reasons you should be pen-testing. 1. Real-world Experience Pen-tests give you real world experience in dealing with an attack. Penetration...
Blog

Core Impact Pro 2016 R1.2 Now Available

We are pleased to announce the official release of Core Impact Pro 2016 R1.2. More than 46 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote exploits for widely deployed software, and numerous enhancements. Core...
Blog

The New Rules of Penetration Testing

In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million, according to research sponsored by IBM – security executives need to revisit pen testing to make sure it is an ongoing practice in their defense arsenals. By far, organizations who regularly see...
Blog

How to Prepare for a DDoS Attack

“There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think... it's all about the information!" – Sneakers Last week, another massive Distributed Denial of Service (DDoS) attack disrupted large swaths of the internet effecting both direct targets and causing collateral...
Blog

How to Spot High Risk Accounts in Your Organization

The Danger of Stolen or Misused Credentials According to the Verizon Data Breach Report over 80% of breaches were due to stolen or misused credentials. This shows us that our access credentials are more valuable than ever which means that being able to locate our high risk access accounts has become more important than ever. Do you know who has the administrative privileges to your key...