Just in the last post, we were discussing how even some of the world’s mightiest enterprises were falling prey to hackers. Now comes the bad...
Even UK Ministry of Defence Not Immune to Cyber-Attack!
Even some of the world’s mightiest organizations are not immune to cyber-attacks. Just a few days ago, British Military’s head of cyber security Major General...
Password Manager Pro offers rock solid security, reveals penetration test by Seibert Media
It goes without saying – software products operating in the IT Security space should offer rock solid security. These products should be devoid of holes...
Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager Pro
Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data,...
Launch secure, browser-based Windows RDP, SSH and Telnet sessions from Password Manager Pro
Launching remote login sessions: Ease of use Vs Security Organizations are deploying privileged password management solutions to mitigate cyber threats and control access to sensitive...
Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]
In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes...
Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-1]
At over $60 billion per year, Medicare fraud has become one of the most profitable crimes in America, say analysts. In South Florida, health information...
Privileged User Monitoring and Audit (PUMA)
Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise....
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]
In the previous four posts, we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong...