Mobile Search Mobile Menu

By Abhi Yadav

The Lifecycle Management Opportunities of a Data Breach (Part 3)

This is our third in a series of commentaries on minimizing the risk of becoming the next front page news story on data breaches. Identity lifecycle management is one of the most critical parts of a security and identity and access management program.  Identifying the assets and setting a baseline for acceptable risk needs to […]

By Abhi Yadav

Managing the Keys to the Kingdom – Privileged/Shared Accounts (Part 2)

This is our second in a series of commentaries on minimizing the risk of becoming the next front page news story on data breaches. Privileged and Shared Accounts are some of the most critical assets to manage in an organization since they provide broad access to systems and sensitive corporate and state information. Privileged Accounts […]

By Abhi Yadav

Ensuring You Don’t Become the Next Data Breach Story (Part 1)

Recent headline Cyber Crimes at major retailers, health insurers, and even US Government agencies suggest that those involved were not necessarily performed by criminal masterminds, but rather by individuals that at one time had been properly credentialed to access systems or by individuals that were simply exploring open doors to identify vulnerabilities,. As information technology […]