Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The advantages of using time-based one-time passwords (TOTP)

In the fast-paced world we live in, where organizations face increasing threats to their security and protecting sensitive information, implementing robust security measures is paramount. Static passwords have proven inadequate in safeguarding data from unauthorized access and data breaches. However, there is a solution that addresses these vulnerabilities: time-based one-time passwords (TOTP).

Establishing Privileged Access Management standards for your organization

Privileged accounts are the prime target of cybercriminals hoping to access an organization’s assets. Without a way to keep track of, secure, record and analyze privileged users and the privileged sessions they perform, it’s only a matter of time before a hacker finds their way into your more critical assets. That’s where setting Privileged Access Management standards comes in.

The benefits of Privileged Access Management for compliance and regulation

Privileged Access Management (PAM) is a crucial aspect of any organization's cybersecurity strategy, especially in industries that handle sensitive data, such as health care, finance and government. PAM involves implementing policies, procedures and tools to manage and monitor access to privileged accounts and limit the risk of unauthorized access or misuse. This ensures that only authorized personnel can access critical systems and data, reducing the chances of a security breach.

Expanding Enterprise Attack Surfaces (EAS) and the increasing importance of Identity & Access Management

In the past five years, Enterprise Attack Surfaces (EAS) have evolved significantly. EAS refer to the various entry points that cybercriminals can exploit to gain unauthorized access to an organization's digital assets. With the increasing use of cloud-based services, the proliferation of connected devices and the growing reliance on third-party vendors, attack surfaces have become broader, more numerous and more complex.

How to find and manage privileged accounts in Active Directory

When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged accounts. It’s not without its faults, however. In this blog, we will explore the admincount attribute in more detail and potential uses it may have for determining which accounts may have or had privileged access.

How to conduct a Privileged Access Management risk assessment

In today's business landscape, organizations rely heavily on digital systems, applications, and webpages for their daily operations. However, with the increasing use of technology comes growing risks of unauthorized access to sensitive information and data.

Best practices for implementing Privileged Access Management

Privileged Access Management (PAM) is a critical component of any organization's cybersecurity strategy. Privileged accounts provide access to the most sensitive data and systems within an organization. As such, it's essential to manage them carefully to prevent unauthorized access, data breaches and cyberattacks. Here are some best practices for implementing PAM in your organization to ensure that your privileged accounts are secure and protected.

Featured Post

Password Managers: Here to stay?

Password managers have become popular solutions for businesses and individuals seeking to improve the password security of their accounts. The implementation of password management solutions within organisations has enabled security teams to securely store and manage company credentials for online and offline applications by using advanced encryption.

Women in Cybersecurity UNITE

The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.