Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Random but Memorable - Episode 12.5: Family Online Safety Sandwich with Stephen Balkham from FOSI

How can we make the online world safer for our kids and families? This episode, we learn how to strike a harmonious balance of online privacy and security with founder of the Family Online Safety Institute, Stephen Balkham. Tune in to hear his top tips for keeping our kids and families digital lives safe.

Implicit Trust vs Explicit Trust in Access Management

While trust plays an important role in access management, not all types of trust are created equal. When it comes to access management, there are two types of trust to pay close attention to, implicit trust and explicit trust. Let’s go over what these types of trust are in access management and how they differentiate from one another.

Keeper Protects From Stolen Credentials With Secure Time-Limited Access

The security concept known as “Privilege Creep” occurs when an individual accumulates access rights over time, retaining entry to systems and data beyond the completion of a specific task or the need for such access. This gradual accumulation of unnecessary privileges within an organization not only complicates the management of access rights but also magnifies the potential for security breaches, data theft and misuse of information.

Seven Best Practices for Privileged Access Management

Privileged Access Management (PAM) protects an organization’s most critical systems and accounts from unauthorized access, making it important to have a good PAM strategy in place. Some of the best practices to develop a good PAM strategy include implementing least privilege access, monitoring privileged accounts, adopting password security best practices, requiring multi-factor authentication and auditing privileges regularly.

Understanding and securing shadow IT for HR, finance, and marketing

This is the third in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.

Eight Common Attack Vectors Organizations Need To Be Aware Of

An attack vector, also known as a threat vector, is a way for cybercriminals to gain access to an organization’s network or system. Some common types of attack vectors that organizations need to defend against include weak and compromised credentials, social engineering attacks, insider threats, unpatched software, lack of encryption and misconfigurations. Organizations must identify all of the potential attack vectors and protect their network against them to avoid security breaches.

How To Securely Manage Database Access for Remote Users

The best way to securely manage database access for remote users is by using a Privileged Access Management (PAM) solution. PAM solutions provide full visibility and control over database access to prevent privilege misuse, reducing the likelihood of an insider threat harming your organization.

Introducing Time-Limited Access

As an enhancement to Keeper’s secure sharing capabilities, Time-Limited Access allows you to securely share credentials or secrets with other Keeper users on a temporary basis, automatically revoking access at a specified time. Time-Limited Access prevents long standing privileges and ensures that information is removed from the recipient’s vault, greatly reducing the risk of unauthorized access. Time-Limited Access brings several key benefits to users and administrators.