• Hindsight and Cyber Security Predictions for 2016

    The arrival of the New Year provides a timely occasion for the security community to reflect upon the lessons learned over the past year and examine the challenges – and opportunities – ahead. Compromised privileged accounts and credentials continued to …

  • SSH Keys: The Powerful, Unprotected Privileged Credentials

    When thinking about privileged accounts – and the credentials used to access them – passwords typically come to mind. Yet passwords are only part of the equation. The Secure Shell (SSH) key, a low-profile, “Swiss Army Knife” of IT teams, …

  • Hosting Congressman Kennedy to Discuss Cybersecurity

    Last week we had a chance to sit down with Congressman Kennedy to discuss a number of things, including the state of cybersecurity. It was a great afternoon and excited to hear his views on how the security industry can …

  • User Behavior Monitoring – Focus on Privileged Users

    ESG’s Jon Oltsik has a great post on Network World this week about enterprise security monitoring.  Large enterprises, he points out, need help in monitoring user behavior as well as endpoints, and sensitive data. Well put, however, I would take …

  • IDC Connection (Part 3): Best Practices for On-going Privilege Protection

    In our previous posts, we highlighted parts one and two of a conversation on privileged account security with IDC analysts Charles Kolodgy and Sally Hudson.  Here is the third and final part of that conversation. This post includes a discussion …