recentpopularlog in

jonerp : access   26

Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Machine Learning Is Helping To Stop Security Breaches With Threat Analytics
"Immediate visibility with a flexible, holistic view of access activity across an enterprise-wide IT network and extended partner ecosystem. Look for threat analytics applications that provide dashboards and interactive widgets to better understand the context of IT risk and access patterns across your IT infrastructure. Threat analytics applications that give you the flexibility of tailoring security policies to every user’s behavior and automatically flagging risky actions or access attempts, so that you’ll gain immediate visibility into account risk, eliminating the overhead of sifting through millions of log files and massive amounts of historical data."
business  featured  posts  technology  software  trends  &  concepts  cybersecurity  louis  columbus'  blog  privileged  access  management  verizon  zero  trust  privilege  security  ztp 
june 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
Google and IBM still trying desperately to move cloud market-share needle | TechCrunch
While becoming cross-platform compatible isn’t exactly a radical notion in general, it most certainly is for a company like IBM, which if it had its druthers and a bit more market share, would probably have been content to maintain the status quo. But if the majority of your customers are pursuing a multi-cloud strategy, it might be a good idea for you to jump on the bandwagon — and that’s precisely what IBM has done by opening up access to Watson across clouds in this fashion.
"While  becoming  cross-platform  compatible  isn’t  exactly  a  radical  notion  in  general  it  most  certainly  is  for  company  like  IBM  which  if  had  its  druthers  and  bit  more  market  share  would  probably  have  been  content  to  maintain  the  status  quo.  But  majority  of  your  customers  are  pursuing  multi-cloud  strategy  might  be  good  idea  you  jump  on  bandwagon    that’s  precisely  what  has  done  by  opening  up  access  Watson  across  clouds  this  fashion. 
february 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
SAP UK & Ireland User Group report continuing issues with indirect access and SAP technology adoption
"SAP UK & Ireland User Group provide a mixed bag of results over the progress made with S/4 HANA, C/4HANA, and indirect access."
brexit  cloud  erp  financials  and  supply  chain  event  reports  indirect  access 
november 2018 by jonerp
Is Your SAP S/4HANA Transformation Strategy Holistic or Full of Holes?
"As 2025 approaches, many companies are developing their S/4HANA transformation strategies through self-education, battle-scarred peers, and interactions with SAP"
sap  cloud  indirect  access  s  4  hana  transformation  4hana 
october 2018 by jonerp
Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
Zero Trust Security Update From The SecurIT Zero Trust Summit
"Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. Tom Kemp, Co-Founder, and CEO, Centrify, provided key insights into the current state of enterprise IT security and how existing methods aren’t scaling completely enough to protect every application, endpoint, and infrastructure of any digital business. He illustrated how $86B was spent on cybersecurity, yet a stunning 66% of companies were still breached. Companies targeted for breaches averaged five or more separate breaches already. The following graphic underscores how identities are the new enterprise perimeter, making NGA and ZTS a must-have for any digital business."
business  featured  posts  technology  software  byline=louis  columbus  centrify  cio  cso  cybersecurity  machine-learning  based  security  next-gen  access  nga 
july 2018 by jonerp
Analytics Are Empowering Next-Gen Access And Zero Trust Security
"Machine learning-based NGA platforms including Centrify calculate a risk score that quantifies the relative level of trust based on every access attempt across an IT infrastructure. NGA platforms rely on machine learning algorithms to continuously learn and generate contextual intelligence that is used to streamline verified user’s access while thwarting many potential threats ― the most common of which is compromised credentials. IT security teams can combine the insights gained from machine learning, user profiles, and contextual intelligence to fine-tune the variables and attributes that calculate risk scores using cloud-enabled analytics services.
business  featured  posts  technology  software  byline=louis  columbus  centrify  analytics  service  next-gen  access  nga  verizon  mobile  security  index  2018  report  zero  trust 
july 2018 by jonerp
Three Ways Machine Learning Is Revolutionizing Zero Trust Security
"Zero Trust Security provides digital businesses with the security strategy they need to keep growing by scaling across each new perimeter and endpoint created as a result of growth. ZTS in the context of Next-Gen Access is built on four main pillars: (1) verify the user, (2) validate their device, (3) limit access and privilege, and (4) learn and adapt. The fourth pillar heavily relies on machine learning to discover risky user behavior and apply for conditional access without impacting user experience by looking for contextual and behavior patterns in access data."
business  featured  posts  technology  software  centrify  enterprise  security  louis  columbus  machine  learning  next-gen  access  zero  trust  zts 
may 2018 by jonerp
How Zero Trust Security Fuels New Business Growth
"Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses."
business  featured  posts  technology  software  byline=louis  columbus  enteprise  security  gdpr  next-gen  access  zero  trust 
may 2018 by jonerp
The B2B Technology Buying Conundrum - by @barnes_hank
"These dichotomies create a conundrum. An environment that seems optimized for the buyer isn’t. And decisions take longer and longer. Indecision is more common, to the point of organizations sticking with the status quo much longer than they would like."
go-to-market  b2b  marketing  sales  buyer  power  buying  process  evaluation  information  access  trust  user  reviews 
november 2017 by jonerp
What SAP’s Indirect Access White Paper Said and Didn’t Say
"Leveraging the white paper alone may provide you with a false sense of security when it comes to Indirect Access. SAP has in-fact omitted that other less common scenarios with meaningful risk and exposure do exist across several of their customers we have engaged. In addition, SAP did not provide any guidance on Indirect Access relative to its customers evolving use of the software. Any analysis you do leveraging the white paper alone will lead to a misinformed view of your risk and associated exposure."
sap  indirect  access 
july 2017 by jonerp
SAP Indirect Access: What the Diageo Case Means to SAP Customers
"The bottom line… SAP has gone all in on the Diageo case, and has been all in on this concept for years because SAP’s future revenue and share of the cloud market is on the line. SAP has clearly developed and is executing on its strategy to incent adoption of SAP cloud solutions. SAP has also positioned itself to capture incremental revenue even if a customer elects to choose an alternative best-of-breed solution."
sap  charge  for  indirect  access  court  case 
march 2017 by jonerp
Survey: Corporate Security Battle is Being Lost
"The enterprise security survey released this week by corporate security vendor Centrify Corp. found that 59 percent of U.S. IT managers shared access credentials with other employees “somewhat often.” Fifty-two percent of those surveyed said they share access credentials with contractors. (The percentages in the U.K. were about 20 percent lower.)"
editor's  pick:  front  page  security  slider:  access  credentials  cloud  breaches 
september 2015 by jonerp

Copy this bookmark:





to read