Author Archive

General Information
User Name Clango
Fullname Clango
Member Since January 23, 2019

Integration Is Key to Maximizing the Value of Cybersecurity Investments

According to a recent survey of compliance decision makers conducted by research firm Vanson Bourne, every organization knows it needs to invest in cybersecurity tools. However, most organizations are having trouble determining where to allocate their security budget as the IT environment rapidly evolves. Not only that, but organizations aren’t doing enough to integrate their security solutions into a...

Poor PAM Practices Put Organizations at Risk

Poor PAM Practices
Most organizations recognize that theft of user credentials is one of the easiest ways for bad actors to gain entry to IT systems. Privileged accounts are especially coveted by external hackers and malicious insiders because they offer virtually limitless access to an organization’s IT infrastructure. Nevertheless, many organizations struggle to implement identity and access management (IAM) and privileged account...

Choose the Right Tool for Privileged Session Monitoring and Management

How many privileged sessions are active in your environment right now? Are you monitoring and managing all of them effectively? Many organizations attempt to use existing security tools that aren’t all that effective at detecting and blocking potentially malicious privileged activity. User and system activity is constantly logged by a variety of tools. In many environments, this information is...

Securing and Monitoring Privileged Access in the Cloud

PSM Cloud
Cloud adoption continues to increase. The cloud market is quickly maturing, and more organizations are moving critical workloads and data into the cloud. In fact, a 451 Research report found that 85 percent of enterprises have sensitive data in the cloud, up from 54 percent the prior year. However, many organizations aren’t doing enough to secure their cloud resources....

Privileged Access Management Helps Meet PCI DSS Requirements

A data breach exposing cardholder data can be devastating. In addition to the cost of breach response, notification of affected customers, legal fees, fines, and penalties, merchants face customer churn and tarnished reputations. That’s why Payment Card Industry Data Security Standard (PCI DSS) compliance is more important than ever. Though PCI DSS compliance will not prevent a security breach,...

Overcoming DevOps Challenges with CyberArk and Clango

DevOps Confide
A new study by the Ponemon Institute finds that organizations are struggling to manage their multi-cloud and hybrid cloud environments. Seventy percent of respondents say they have little to no visibility into the ownership or purpose of many of the virtual machines in the cloud, while 68 percent say they lack a single user interface into the entire cloud...

A Look Inside a Ransomware Attack

Ransomware is one of the most serious cybersecurity threats that organizations face today. According to the quarterly Cybercrime Tactics and Techniques Report from Malwarebytes Labs, the number of detected ransomware attacks on businesses increased 88 percent in the third quarter of 2018. While overall ransomware attacks have trended downward over the past year, security researchers have identified almost 40...

Privileged Account Security Is Critical with ERP Systems

Enterprise resource planning (ERP) systems are the heart of a business, facilitating the flow of data across operational functions. These systems support back-office transactional activities such as accounting, production, inventory control and order management, and provide decision-makers with critical information that can help improve organizational performance. Wouldn’t a hacker love to get into your ERP system? A rogue insider...

A Better Way to Manage and Maintain Your CyberArk Platform

Managed Service
IT teams face ever-increasing demands to quickly enable users to do their jobs more efficiently and innovate to reduce risk and drive competitive advantages. Nevertheless, a sizable portion of the typical IT budget remains dedicated to the maintenance of existing systems and applications. Consequently, IT leaders often lack the resources they need to meet ever-changing business requirements. As organizations...

How CyberArk’s Conjur Helps Secure DevOps and Cloud-Native Environments

According to Forrester Research, at least half of IT organizations are currently using DevOps to increase the speed and efficiency of application development and deployment. Due to the dynamic nature of DevOps, privileged account credentials, encryption keys, and other “secrets” are rapidly proliferating throughout the IT infrastructure. Many of these secrets are stored in code repositories and cloud environments...