2010 had been a terrific year! The concluding days were dominated by WikiLeaks exposures, which have come as a rude shock to many, big surprise to some, huge disappointment to a few and a great fun for others. 
The motive, effects and ramifications aside, WikiLeaks-type exposures perhaps represent the biggest information security threat to Government agencies and enterprises. 
Malicious insiders seem to be causing this harm by either misusing privileged access or giving credentials to too many un-vetted people who then route them to WikiLeaks or any other media outlet. Lack of well-defined access control policies and enforcement mechanism coupled with haphazard style of privileged password management potentially lie at the root of such security incidents.  
 
Now, the big question: How to combat insider threats and WikiLeaks-type security incidents? 
One of the effective ways to ensure internal controls and mitigate insider threats (and thereby combat WikiLeaks-type exposures) is to automate the entire life cycle of Privileged Access Management enforcing best practices. 
In the backdrop of the WikiLeaks exposures, we have come up with a white paper ” Preventing WikiLeaks-type Security Incidents ” that analyzes the various dimensions of information security, the causes for tight security policies, the need for controlling privileged access and the strategies to mitigate the threats.
Take a look at the white paper  and share your feedback.



Bala