Part Four: In-Depth Look at PAM Controls for DFARS Requirements

Posted by James Creamer on Oct 24, 2016 9:51:43 AM

James Series 4.pngAs part of an ongoing series on using privileged account management solutions to meet DFARS requirements, CyberSheath’s security consultants have explored technical controls in great detail, providing readers with real world applications that make a meaningful impact. This week CyberSheath continues to explore NIST control 800-171, “separate the duties of individuals to reduce the risk of malevolent activity without collusion”.

Read More

Topics: CyberArk, Security Assessment, DFARS, PAM

Bad Security Habits Persist, Despite Rising Awareness: 2016 CyberArk Study

Posted by Adam Byars on Oct 18, 2016 9:35:28 AM

2016_Myths_That_Wont_Fly_Blog_Post.jpg

Read More

Topics: CyberArk, cybersecurity

Part Three: In-Depth Look at PAM Controls for DFARS Requirements

Posted by James Creamer on Oct 12, 2016 1:16:32 PM

James_Series_3.jpg

CyberSheath’s security consultants and implementation engineers have previously written about utilizing privileged account management solutions to meet DFARS requirements, and this week James Creamer continues to explore DFARS control requirements in detail.

Read More

Topics: CyberArk, Security Assessment, DFARS, PAM

Part Two: In-Depth Look at PAM Controls for DFARS Requirements

Posted by James Creamer on Sep 26, 2016 10:23:49 AM

James_Series_-_2.jpg

Last week CyberSheath began a new series, “In-Depth Look at PAM Controls for DFARS Requirements”, dedicated to providing a detailed analysis on how privileged account management solutions play an important role for organizations in meeting DFARS requirements.

Read More

Topics: CyberArk, Security Assessment, DFARS, PAM

Part One: In-Depth Look at PAM Controls for DFARS Requirements

Posted by James Creamer on Sep 12, 2016 11:51:14 AM

James_Series_Part_1.jpg

In previous blogs, CyberSheath security analysts have identified new cyber security requirements from the recent changes to DFARS and have provided solution overviews for meeting those requirements and regulations. The series “In-Depth Look at PAM Controls for DFARS Requirements” will expand on previously mentioned regulations and provide a more granular look at how privileged account management solutions can play an important role in meeting DFARS requirements.

Read More

Topics: CyberArk, Security Assessment, DFARS, PAM

SSH Keys: How to Protect the Neglected with Privileged Identity Management

Posted by James Creamer on Jul 18, 2016 9:39:12 AM

Trending_News_Blog_Post.jpg

Organizations continue to expand their application infrastructure at an alarming rate, whether it be in the cloud or on-site. Studies vary, but an estimated 48% to 65% of servers worldwide are run on some flavor of UNIX. The latest report from the Linux Foundation found that Linux is winning the battle in the cloud with an estimated 79% of cloud deployments running the operating system. Many of these UNIX devices are using SSH keys for authentication instead of passwords for the sake of convenience.

Read More

Topics: CyberArk, PAM

What CEOs Don’t Know About Cyber Security: Study from CyberArk

Posted by Adam Byars on Jul 5, 2016 4:08:48 PM

PAMDFARSReq_Blog_Post.jpg

A recent global study shed light on the current gap between executives and their organization’s security. The study, conducted by Dimensional Research (commissioned for a project by CyberArk), surveyed the opinions of 308 IT security professionals worldwide and captured hard data on enterprise security awareness at the executive level. While more and more organizations are quickly increasing their focus on security to stay out of today’s almost weekly headlines of multimillion-dollar security breaches and lawsuits, this study shows executives in general are far behind the curve. Here are some highlights from the study:

Read More

Topics: CyberArk

PAM Solution and PCI Data Security Standard (DSS) 3.2

Posted by Yanni Shainsky on Jun 17, 2016 11:40:59 AM

PAMDFARSReq_Blog_Post.jpg

If you’re reading this blog, chances are, it’s your responsibility to understand and enforce your organization’s compliance with the latest PCI Data Security Standards. With the release of PCI DSS version 3.2, the PCI Security Standards Council General Manager Stephen Orfei explained that “PCI DSS 3.2 advocates that organizations focus on people, process and policy, with technology playing an important role in reducing the overall cardholder data footprint.” Privileged accounts and their management is the central point of where people, process, policy, technology and security converge. It is no surprise then that the PCI DSS 3.2 standards spend much of their time stressing the importance of protecting privileged accounts.

Read More

Topics: CyberArk, PAM

Protecting the Homeland: Critical Infrastructure and Cyber-Attacks

Posted by James Creamer on May 13, 2016 10:43:16 AM

Trending_News_Blog_Post.jpg

The deadline of June 1 looms for the Department of Homeland Security to gather threat-based data regarding our nation’s critical infrastructure. According to Netgov.com, by September of this year, the DHS is tasked with putting together a plan to put that data to use.  This should come as no surprise to security analysts as the rise in critical infrastructure attacks in the media has become more prevalent since the New York Times published articles about Stuxnet and joint Israeli-American involvement. More recently, the world has seen cyber-physical attacks in the Ukraine against its bulk-electric system, in the United States against a NY flood-control dam, and several weeks ago in Sweden against an air-traffic control system.

Read More

Topics: CyberArk, PAM

Privileged Accounts, the Anomaly of Cybersecurity

Posted by Ross Moir on Mar 26, 2015 8:47:00 PM

 

Read More

Topics: CyberArk, Privileged Accounts