privileged access

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if […]

Data breach at the border. Are your subcontractors an easy target? Read More »

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

How to speed up ROI with PAM solutions?

Talking about ROI with every security solution is always tough. Why? Because we need to talk about what issues could befall us if we decide not to implement the given product. We have to talk about the loss. This can include real financial loss caused by criminals and problems which are intangible  – like brand

How to speed up ROI with PAM solutions? Read More »

Talking about ROI with every security solution is always tough. Why? Because we need to talk about what issues could befall us if we decide not to implement the given product. We have to talk about the loss. This can include real financial loss caused by criminals and problems which are intangible  – like brand

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information

Agent or Agentless approach? Read More »

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information