Why PAM Should Be a CISO's Top Priority

Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface and prevent, or at least mitigate, the damage arising from external attacks as well as from insider wrongdoing or negligence.

Max Aulakh | Interviews |Anupam Srivastava | CISO| State of Ohio |

Ignyte CEO, Max Aulakh interviews Anupam Srivastava, Chief Information Security Officer for the State of Ohio discusses the impacts Ohio counties are making through technology, measures the state is taking to detect and combat security vulnerabilities, and bridging the gap in the talent pool.

Lacking Direction to Address your ICS Cybersecurity Issues? Here's What You Can Do

With more and more automation systems and industrial devices being connected to networks, raw data from every device can be transformed into a treasure chest of valuable information. Granted, this data can help to optimize the process, but with connectivity comes new ICS cybersecurity concerns.

NIST's New Framework to Mitigate Privacy Risks

Over the past few years, there has been a massive cultural and legal shift in the way consumers view and secure their personal data online that’s in line with the rise of advanced technologies like artificial intelligence. Concerned by an increasing rate of incidents that range from the 2017 Equifax hack to the scandalous Cambridge Analytica gaming of consumers’ social media data for political purposes, policymakers have begun to strike back on consumers’ behalf.

Tigera Joins the Fortinet Fabric-Ready Program and Partners with Fortinet to Secure Kubernetes Environments

We are proud to partner with Fortinet and join their Fabric-Ready Technology Alliance Partner program. With this partnership, Fortinet customers will be able to extend their network security architecture to their Kubernetes environments. Our partnership was driven from interest from Fortinet’s customers to protect their Kubernetes based infrastructure. Kubernetes adoption is growing like wildfire and nearly every enterprise on the planet is at some stage of their Kubernetes journey.

Neal Saling | Interviews | Michael Hofherr

Neal Saling director of Ignyte Assurance Platform interviews Michael Hofherr, VP & CIO for The Ohio State University. Michael shares his thought leadership and discusses challenges and opportunities for IT in the university space, the role technology will play in the workforce over the next 10 years, how technology will change the higher education landscape for future students, and key leadership skills.

DNS Rebinding: A Frightening Attack Vector with Spooky Security Impacts

One of the greatest misconceptions about online safety is that home networks are somehow private. Unfortunately, this hasn’t been true since around the turn of the century when we started filling our home networks with Internet-connected boxes serving local web pages. The problem is that web browsers typically make little distinction between web sites on the public internet versus those on a home or office network.