• SSH Keys: The Powerful, Unprotected Privileged Credentials

    When thinking about privileged accounts – and the credentials used to access them – passwords typically come to mind. Yet passwords are only part of the equation. The Secure Shell (SSH) key, a low-profile, “Swiss Army Knife” of IT teams, …

  • Hosting Congressman Kennedy to Discuss Cybersecurity

    Last week we had a chance to sit down with Congressman Kennedy to discuss a number of things, including the state of cybersecurity. It was a great afternoon and excited to hear his views on how the security industry can …

  • User Behavior Monitoring – Focus on Privileged Users

    ESG’s Jon Oltsik has a great post on Network World this week about enterprise security monitoring.  Large enterprises, he points out, need help in monitoring user behavior as well as endpoints, and sensitive data. Well put, however, I would take …

  • IDC Connection (Part 3): Best Practices for On-going Privilege Protection

    In our previous posts, we highlighted parts one and two of a conversation on privileged account security with IDC analysts Charles Kolodgy and Sally Hudson.  Here is the third and final part of that conversation. This post includes a discussion …

  • IDC Connection (Part 2): What are Privileged Accounts and How Can You Secure Them?

    In our previous post, we highlighted part of a conversation on privileged account security with IDC analysts Charles Kolodgy and Sally Hudson.  Here is part two of that conversation. CyberArk: What is privileged account security and why is it important? …