Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Understanding the basics of Cloud Security: Cloud Privilege Escalation

Cloud privilege escalation is a growing concern for organizations as they embrace cloud-based infrastructure and services. To address the risks associated with privilege escalation, it's vital to implement robust security practices. In this post, we’ll cover privilege escalation as it relates to cloud security risk and the best practices for mitigation.

How CIAM safely orchestrates your customers' journey and its benefits

Customers’ willingness to give you their personal data begins with the experience they receive. Convincing them requires the right tone, an outlook of what they’ll get in return, and most importantly, a high level of trust. But while companies depend on customer data to unlock growth, user-centric data collection can be tricky. 43% of U.S.

Optimising PAM for Cost Savings and Stronger Security

It's imperative for organisations around the globe to properly secure their privileged credentials, accounts and sessions to protect their digital crown jewels from unauthorised breaches, yet traditional Privileged Access Management (PAM) solutions are failing enterprises. These solutions are proving too costly in many cases - and so complex in others - that many organisations are opting to shelve or never fully deploy their PAM products, saying they're wasting money on features they don't even use.

How to configure Self-service privilege elevation for Linux devices | ManageEngine PAM360

ManageEngine PAM360 is an enterprise-grade unified privileged access management solution that offers strict governance of privileged users, credentials, digital entities, and other shared sensitive information.

How to set up and use SSH Command Control | ManageEngine PAM360

ManageEngine PAM360 is an enterprise-grade unified privileged access management solution that offers strict governance of privileged users, credentials, digital entities, and other shared sensitive information. Through PAM360’s SSH command control (aka filtering) capabilities, IT administrators can create allowed command lists for critical Linux devices and allow only those pre-approved commands to be executed when an SSH connection is made to a device.

The ZTNA Evolution - My Journey

As many of you know, I was an early adopter of Zero trust Network Access (ZTNA) while working in my previous role, which led me to work at Axis today. As our contract was coming up for renewal, I did what all IT folks do and went out on the market to see what had changed during our contract period and to see if anything existed that was better.

Understanding the Internet-Connected Branch | Zero Trust Architect

Are you confused about what the Internet-connected branch can mean for your business? Whether you're an IT, networking, or security professional, this video will provide you with valuable insights into the Internet-connected branch and how SSE can help you protect it.

Architecting to Protect Against Ransomware

So, for anyone that has been in IT for the last 10+ years, you will know that the risk of ransomware and cyberattack is not something new. It’s been on our radar as a top concern for many years. The difference now is the prevalence of attacks on large global companies which has raised this security issue all the way to the Board of Directors. A few months ago, when Russia invaded Ukraine, our concerns became something the whole world rather than just IT started to hear about.