Data Breach at LinkedIn: Time to Seriously Consider Using a Password Manager!

Just in the last post, we were discussing how even some of the world’s mightiest enterprises were falling prey to hackers.  Now comes the bad...

Password Manager Pro 4 min read Read

Even UK Ministry of Defence Not Immune to Cyber-Attack!

Even some of the world’s mightiest organizations are not immune to cyber-attacks. Just a few days ago, British Military’s head of cyber security Major General...

Password Manager Pro 2 min read Read

Password Manager Pro offers rock solid security, reveals penetration test by Seibert Media

It goes without saying – software products operating in the IT Security space should offer rock solid security. These products should be devoid of holes...

Password Manager Pro 3 min read Read

Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager Pro

Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data,...

Password Manager Pro 2 min read Read

Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]

In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes...

Password Manager Pro 3 min read Read

Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-1]

At over $60 billion per year, Medicare fraud has become one of the most profitable crimes in America, say analysts. In South Florida, health information...

Password Manager Pro 2 min read Read

Privileged User Monitoring and Audit (PUMA)

Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise....

EventLogAnalyzer 4 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]

In the previous four posts, we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong...

Password Manager Pro 4 min read Read