New Zealand's leading source of cybersecurity and threat news
Privileged Account Management
These search results are from across the Techday network of sites
Thycotic releases new integrations to bolster account governance
“Service accounts are often left defenceless, even by enterprises with established programs for privileged user security."
Post-COVID-19, every user should be treated as privileged
Privilege is about what data a person can access, or actions a person can perform. It is about people, not just about accounts that unlock access to said data or elevated actions, writes Thycotic security engineer for Asia-Pacific Daniel Comarmond.
Thycotic rolls out ServiceNow integration for privileged service accounts
The integration aims to resolve workflow approvals, which is a common bottleneck for IT teams that manage privileged service accounts.
Privileged credentials: They're like diamonds for criminals
Criminals are looking to steal any credentials that could allow for privilege escalation.
Thycotic’s cloud-based PAM offering now has full capabilities
Thycotic has upgraded its privileged account management-as-a-service offering with all of the features of the on-premise version.
CyberArk expands privileged account security offering for MSSPs
CyberArk has extended its privileged account security options for managed security service providers (MSSPs).
70% of firms would fail a privileged account management audit
Firms believe privileged account management is important for security - but why are they still doing it wrong?
CyberArk strengthens defenses against privileged account exploitation through Vaultive buyout
CyberArk has bought out cloud security firm Vaultive as part of a move to extend its capabilities in the privileged account management space.
Australian firms face cybersecurity inertia as the struggle to keep up takes its toll
Australian organisations are being left stranded in a haze of inertia about their cybersecurity strategies, even after a cyber attack has hit them.
Singapore firms suffer cybersecurity inertia as attacks take heavy toll
38% of respondents rarely make substantial changes to their security strategy, even after being breached.
Inside modern hacking: The seven stages of a breach
Hackers are increasingly targeting an organisation's most precious resource - its people.