As this technology is automated, it can also scan more accesses because a new rule doesn’t need to be created for each access. You can jump from a 1% audit rate to a 99% audit rate.
How does a conglomerate implement PAM across multiple companies? What are some of the challenges, and how can you overcome them? Gonz Gonzales, the CISO at JG Summit Holdings, one of the largest conglomerates in the Philippines, shares his journey of PAM implementation across companies.
With the ongoing pandemic driving digital transformation and hybrid work, it's no surprise that the theme of this year's RSA Conference was "transform." Carrying forward that theme, RSA CEO Rohit Ghai says that channeling "disruptive forces at play" can be a powerful tool for driving needed changes.
In the latest "Proof of Concept," Lisa Sotto, Jeremy Grant and ISMG editors discuss the significance of Apple, Google and Microsoft supporting the FIDO protocol's passwordless sign-in standard, progress made on Biden's cybersecurity executive order and updates on U.S. cybersecurity and privacy laws.
We see figures around projected endpoint security spend climbing year-over-year as organizations aim to protect themselves against today’s evolving threat landscape. In a December ‘21 survey by ESG, 75% of respondents indicated that they planned to increase their spending in endpoint security over the next 12...
We see figures around projected endpoint security spend climbing year-over-year as organizations aim to protect themselves against today’s evolving threat landscape. In a December ‘21 survey by ESG, 75% of respondents indicated that they planned to increase their spending in endpoint security over the next 12...
As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.
In this edition, four ISMG editors discuss important cybersecurity issues, including how virtual currency Monero is becoming the main alternative to Bitcoin as the crypto choice for criminals, the challenges involved in an identity-centric Zero Trust approach and how to influence change in culture.
How does one decide the right approach to zero trust, and what are some important considerations to keep in mind? A panel of experts - Brett Winterford, Chirag Joshi and Jay Hira - share their in-depth views and discuss issues including how to take an identity-centric zero trust approach.
Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of credentials.
In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are
escalated to gain access to more privileged accounts — the keys to the...
The headline-grabbing incidents of the past year have hammered home
one point: There is a huge difference between incident response planning
and being incident response-ready. Joseph Carson of Delinea talks about
this distinction and how to refine your readiness.
In this eBook, Carson discusses:
Why incident...
Ditch the old “castle-and-moat” methods. Instead, focus on critical access points and assets, making sure each individual point is protected from a potential breach.
Sunder Krishnan, chief risk officer at Reliance Nippon Life Insurance Co., a joint venture of Reliance Capital and Nippon Life, discusses risk management approaches; using PAM, data encryption and other processes to safeguard customer data; and investing in behavioral systems to secure data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.