The search found 3762 results.
Blog
The National Institute of Standards and Technology (NIST) recently put out a draft “Guide to Enterprise Password Management” for public comment for feedback and improvement. While it gives a lesson in password management history, it doesn’t quite break new grounds on prescriptive opinion.
Dave Kearns provided useful analysis of the NIST paper in his recent Managing Passwordsarticle on Network World, and a couple of nuggets of wisdom jumped out at me:
Blog
National Health Information Technology Week (#NHITweek) is taking place this week, September 26-30, 2016. For more than a decade, I had the pleasure and honor of serving as an IT senior leader for hospital systems in the Dallas area as a Chief Information Officer and a Chief Technology Officer. During my tenure it became quickly apparent the massive role that Health IT plays in positive patient outcomes and how crucial it is for the technology to really work for the clinicians.
News
As cyber threats increase, federal cybersecurity policy is reshaping what compliance, access, and resilience look like for critical infrastructure operators. Agencies like the Cybersecurity and Infrastructure Security Agency (CISA) are moving beyond traditional compliance models toward more dynamic, operational mandates.
Blog
If you’re in the cybersecurity field, chances are you’ve come across Zero Trust architecture (or any variants of it) enough to know what Zero Trust means. Essentially, the Zero Trust cybersecurity approach is kicking old methods to the curb while embracing the basic principles of security.
Blog
If you’re in the cybersecurity world, you’ve probably come across the acronym PAM, or Privileged Access Management. This technology adds additional access controls and processes to coveted privileged credentials in order to prevent them from being compromised, while also limiting the damage if they ever are compromised.
Blog
Risk management is critical for any company looking for growth and profit instead of liabilities and reputational damages. So let's answer an important question: What is third-party remote access, and why should you care? Networks can be attacked from all sides.
Blog
In the past century, we have witnessed globalization interconnect the trade of goods and services around the world. But as we have evolved into a digital society, interconnectivity has become far...
Blog
What is secure remote access? Remote access ensures anyone accessing your network is authenticated using a secure connection. Read to learn more.
Blog
What is privileged access management (PAM)? If you need to secure information, don’t wait to find out. Read more about PAM here!