Information, in prehistoric times, was exchanged mostly in service of eating and running from things that could eat you. “Watch out for that bear!” was a particular favorite of our early forefathers. Following the advent of writing, information could be used to organize societies, spread entertainment, and transfer messages over distances and times. The writings […]

Read more

Having trouble understanding IT security lingo? No problem. With our PAM Dictionary created by our experts you’ll be an expert yourself in no time.

Read more

There is no place in the world where you feel so safe, so alone, as your bedroom. It’s why we feel comfortable there, while doing the most vulnerable things humans do. A listening device within the four walls of one’s bedroom was, for most of recent history, a tool for evil, only found in science […]

Read more

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if […]

Read more

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything […]

Read more

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company. […]

Read more

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case […]

Read more

The Case On June 11th, 2019 NBC News portal published a story about an information leak at U.S. Customs and Border Protection (CBP). In a nutshell, images of travellers and vehicle plates, presumably collected at points of entry, have been copied to a subcontractor’s network in violation of government policies and without the agency’s authorization. […]

Read more

Better late than never. Better luck next time? These phrases conjure up notions of doing too little too late. They don’t exactly instill very much confidence. Perhaps something that should’ve been done, just wasn’t. So what happens next? Should you blame a person, or perhaps a team? Did someone do something wrong on purpose, or […]

Read more

Happy New Year to one and all 2018 was another good year for the Privileged Access Management market. Why? Gartner has revealed its first Magic Quadrant, awareness among enterprises has increased, market growth rates remained in double digits and we’ve seen the first moves of consolidation. As for the technology, the market realized that PAM […]

Read more