Blog Listing

Privileged Users In Your Cloud Applications: Who Are They?
Privileged users of Salesforce, Microsoft 365, and other mission-critical cloud applications have access to sensitive data. Find out who these users are and how to secure your organization's data.
Privileged Users in Salesforce: What Can They Access?
Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. Identify potential privilege misuse and with the tips in this post.
Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
Ponemon: The Average Cost of a Data Breach 2017
The spotlight continues to shine on data breach incidents. It comes as no surprise that the average cost of a data breach in 2017 has risen in the U.S. Learn key takeaways from the study in this post.
People-Centric Information Security
The people within your organization are what make it great. The right monitoring tools, information security, and support can make it even better.
OCR Seeks Public Comment on HIPAA Privacy Rule Impact on Coordinated Care, Possible Changes to Rules
If you’ve ever felt like the HIPAA Privacy Rule needs some work — or stands in your organization’s way of providing coordinated, value-based healthcare — then the U.S. Department of Health and...
Motivations Never Imagined – The Escalating Value of Patient Information to Bad Actors
The need for real-time information security with coordination between vendors and customers across the industry a necessity. In this post, read more about protecting patient data from bad actors.
Employee remote access risks vs. vendor access threats
Employee remote access risks vs. vendor access threats
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
10 questions to ask privileged access management vendors
10 questions to ask privileged access management vendors
If a hacker gets access to your privileged accounts they can move around your network, applications and equipment.
The do's and don'ts of using active directory in your organization
The do's and don'ts of using active directory in your organization
Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool.
Is hacking the new robbing? Cybersecurity in the finance industry
Is hacking the new robbing? Cybersecurity in the finance industry
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Post-it passwords
Post-it passwords
.node__body h2 { font-family: proxima-nova, sans-serif; font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media scree
IoT devices and secure remote access
IoT devices and secure remote access
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Attack surfaces and third-party remote access
Attack surfaces and third-party remote access
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Are you protected from a supply chain attack?
Are you protected from a supply chain attack?
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Data breaches are overwhelming the news cycle. Are you next?
Data breaches are overwhelming the news cycle. Are you next?
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Retail data breaches caused by vendor security problems
Retail data breaches caused by vendor security problems
Grab a burger at Sonic or roast beef sandwich from Arby’s and watch a new episode streaming on Netflix in your hotel room—what do these consumer-related acti
Data breaches: Is the healthcare industry vulnerable?
Data breaches: Is the healthcare industry vulnerable?
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Improve your retail outlook with PCI-compliant remote access
Improve your retail outlook with PCI-compliant remote access
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
Secure remote access—Third parties and the finance industry
Secure remote access—Third parties and the finance industry
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h