A New Privileged Account Security Model

June 7, 2013 CyberArk

by Derrick Pyle

Regular readers of our blog know that one of our favorite topic areas is the connection between advanced threats and privileged accounts Our interest in this critical connection is one of the reasons we were pleased to announce the availability of a new report from Enterprise Strategy Group (ESG), entitled “Advanced Cyber Threats Demand a New Privileged Account Security Model.”

In the report, Senior Principal Analyst Jon Oltsik states and supports his agreement that cyber-attackers increasingly target privileged accounts as part of their sophisticated enterprise assaults. More importantly, Oltsik determined that organizations are taking inadequate, tactical steps to prevent these attacks and their escalation. He recommends that organizations deploy a comprehensive privileged account strategy with centralized management, monitoring and control of these powerful privileged accounts in order to minimize the “attack surface.”

Oltsik’s research once again adds more color to the continually evolving and compelling threat landscape surrounding privileged accounts.

If you would like to read more about his findings, then please make sure to obtain your free copy of the report. Oltsik will also be hosting a special, real-time Q&A discussion of his research findings on Twitter, using the hashtag, #PrivSec, on June 19, 2013 at 3:00 PM EST. To find out more about that event please follow us on Twitter. We will be tweeting details about the event in the coming weeks. We hope to see you there.

Previous Article
Snowden’s Remarks Should Make Any InfoSec Professional Shiver
Snowden’s Remarks Should Make Any InfoSec Professional Shiver

by John Worrall Whatever your personal views on Edward Snowden’s activities with NSA secrets, his words and...

Next Article
Designing Operational Technology with Security in Mind
Designing Operational Technology with Security in Mind

by Yariv Lenchner I saw a post recently on Slashdot that got me thinking about the security of operational ...