Why Privileged Identity Management Implementations Fail
As veterans of the privileged identity management (PIM) field, my colleagues and I hear some unsettling stories from organizations whose privileged identity management deployments did not provide the...
View ArticleDon’t Overlook Database Security
Over the years I’ve been amazed by some of the questionable security practices that I’ve witnessed in some very large organizations. One big concern is casual attitudes that often prevail with respect...
View ArticleInsider Threats, Misused Privileges are Leading Causes of Security Breaches
Last week Verizon Business released its 2010 Data Breaches and Investigations Report with some fascinating results. According to the report, 48% of data breaches are caused by insider threats, up from...
View ArticleWhere is Lieberman Software in September?
Now that Labor Day is behind us, we’re marching into fall and entering a very busy time period. Tradeshows, webinars and a multitude of events abound and we’re hitting the road. I will be speaking at...
View ArticleVideo: Privileged Identities Explained
As an IT professional you already know the challenges of discovering, managing and auditing the privileged identities that exist on computer operating systems, network and backup appliances, directory...
View ArticleYour Top Insider Threat
A new Network World article profiles the threat of system administrators who can intentionally or accidentally harm your organization through misuse of privileged identities. Absent the right kinds of...
View ArticleSecurity Expert Michael C. Theis Discusses the Insider Threat
Michael C. Theis has more than 25 years of experience as a counterintelligence special agent and 30+ years of concurrent work in computer systems engineering. He directs cyber threat management...
View ArticleAnother Security Tax on Microsoft Serves No Purpose
I was asked recently: “Should Microsoft be trying to solve the weaknesses in its much-used software by providing security bundled into its own software, or should it provide money for research by...
View ArticleFast Track to CAG 12 Compliance
If you’ve ever been subject to typical IT security compliance regulations you’ve no doubt experienced the frustration of putting into action what can at times seem like complex, almost unintelligible...
View ArticleBeyond Regulatory Compliance
In general, there are plenty of governance and compliance frameworks that minimize risk and improve operational security and reliability. But true security is an ongoing strategic imperative that...
View Article
More Pages to Explore .....