Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]

In the previous four posts, we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong...

Password Manager Pro 4 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-4]

In the previous three posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-3]

In the previous two posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-2]

In the previous post, in the backdrop of the cyber-attack on Zappos.com, we analyzed the main challenges associated with achieving the highest level of information...

Password Manager Pro 2 min read Read

Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-1]

For information security, the year 2012 has indeed started off with a shocking note. Zappos.com, one of the largest online retailers dealing with shoes and...

Password Manager Pro 2 min read Read

Password Manager Pro is worth every penny, say our customers!

There can’t be a better finish to an eventful year. As 2011 is drawing to a close, we are hearing feedback from scores of highly...

Password Manager Pro 1 min read Read

Password Manager Pro emerges the top choice of IT Managers across the globe in 2011

2011 is fast drawing to a close.  While looking ahead for a great holiday season and a wonderful New Year 2012, we just looked back...

Password Manager Pro 2 min read Read

How do you control concurrent privileged access to sensitive IT resources?

In enterprises, quite often, many administrators might be accessing a system in production environment concurrently. They might be attempting to carry out conflicting operations, unconnected...

Password Manager Pro 2 min read Read

How do you share privileged passwords in your enterprise? [Part-3]

In the previous two posts , we discussed the casual manner in which privileged passwords are shared among various works groups in enterprises and the...

Password Manager Pro 2 min read Read