Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager Pro

Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data,...

Password Manager Pro 2 min read Read

Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]

In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes...

Password Manager Pro 3 min read Read

Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-1]

At over $60 billion per year, Medicare fraud has become one of the most profitable crimes in America, say analysts. In South Florida, health information...

Password Manager Pro 2 min read Read

Privileged User Monitoring and Audit (PUMA)

Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise....

EventLogAnalyzer 4 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]

In the previous four posts, we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong...

Password Manager Pro 4 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-4]

In the previous three posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-3]

In the previous two posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-2]

In the previous post, in the backdrop of the cyber-attack on Zappos.com, we analyzed the main challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read