logo
October 11, 2024 | Martin Cannard

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require...
August 20, 2024 | Martin Cannard

What is Zero Trust?

"Never trust; always verify." That's the philosophy that drives the Zero Trust model, and it represents a major shift from the previous motto: "Trust but verify." As threat actors have become more sophisticated, organizations have shifted their security frameworks away from a network-centric model...
April 11, 2024 | Martin Cannard

Zero Trust vs. Least Privilege

Zero Trust and the Principle of Least Privilege are security models designed to improve security posture by restricting unnecessary access to systems and data. Both models are a reliable way to limit access to resources and tighten your security measures. The Difference Between Zero Trust and...
March 20, 2024 | Martin Cannard

5 Steps to Auditing Administrator Access Rights

Accounts with administrative and elevated privileges are necessary for both business and IT functions, but they represent a significant risk to your organization. In the hands of a careless or malcontent insider or an adversary, privileged credentials open the door to data breaches, infrastructure...
December 18, 2023 | Martin Cannard

Steps to Control Local Admin Rights

IT pros need local admin rights on corporate devices to install software, modify configuration settings, perform troubleshooting and so on. But all too often, business users are also routinely granted local admin rights on their computers. While giving users these rights can be convenient, it...
January 10, 2022 | Joe Dibley

PACRequestorEnforcement and Kerberos Authentication

During the November 2021 Patch Tuesday, Microsoft released new security updates for Kerberos. They include new system events and new structures in the Kerberos Privileged Attribute Certificate (PAC). Let’s look see what impacts these updates may have on operations and Kerberos ticket-based...
December 2, 2021 | Jeremy Moskowitz

AppLocker Pros, Cons, and Alternatives

AppLocker is an application control feature found in enterprise editions of Windows. The tool enables you to manage which applications and files users can run. Windows AppLocker aims to limit software access and related data from specific users and business groups. The results of which is...
September 8, 2021 | Martin Cannard

Just-in-Time Administration for Secure Access Management

Although external cybersecurity attacks and malware make for sensational headlines, the biggest security threat most organizations face comes from trusted insiders with privileged access to sensitive data. Cybersecurity Insider's 2020 Insider Threat Report reveals that 68% of organizations report...
August 25, 2021 | Martin Cannard

Why Zero Standing Privileges Is a Better Approach to Privileged Access

Admin rights are a double-edged sword: While IT pros require elevated rights to do their jobs, those privileges can be misused by the admins themselves — as well as abused by adversaries who have compromised their accounts. The first step in defending against these risks is fairly...
December 3, 2019 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
Show more articles
...