Technology news for New Zealand's largest enterprises
Privileged Access Management / PAM
These search results are from across the Techday network of sites
70% of firms would fail a privileged account management audit
Firms believe privileged account management is important for security - but why are they still doing it wrong?
Why the NBD means privileged access is more important than ever
There is an easy way to make sure that your organisation is still protected under the NBD - privileged access management.
KPMG continues push into IAM space through Cyberinc buyout
The acquisition will see up to 25 Cyberinc employees join KPMG's Australian arm to boost capabilities in domestic identity and access management.
Why NDB compliance starts with the “essential” security basics
Ivanti talk about the upcoming ramifications of the Notifiable Data Breaches act, and the simple things you can do to prepare.
Inside modern hacking: The seven stages of a breach
Hackers are increasingly targeting an organisation's most precious resource - its people.
Guardians of data: Who watches over our information
Controlling who has access to certain information is a necessity in today’s business world.
Protecting agile business innovation against devastation
As DevOps takes hold, more and more privileged account credentials and secrets are created and shared across interconnected access points.
Apple addresses serious root access vulnerability in latest MacOS High Sierra update
Apple has been quick to address the major CVE-2017-13872 security flaw in its macOS High Sierra 10.13.1 operating system.
'Golden SAML' attack technique can bypass authentication controls
"Attackers are still able to gain this type of access (domain admin), and they are still using golden tickets to maintain stealthily persistent."
Interview: CA Technologies talks privileged access management
“Anything we do is around data breach prevention and hybrid enterprise protection for a mix of on-premise, SaaS applications & virtualised platforms."
Widespread mismanagement of privileged accounts and access revealed in global survey
These findings are significant considering that privileged accounts grant access to nearly every component of a company’s IT infrastructure.
Singapore, Aus employees admit to snooping around corporate networks
Employees in Singapore, Australia and across the globe snoop their employer’s networks to seek information they are not permitted to access.
Dormant employee accounts a major cyber risk for Singapore businesses
Only seven percent of respondents in Singapore say they remove access for users immediately upon a change in HR status.
Hackers speak: Privileged accounts best way to steal data
From the mouths of the hackers themselves, organisations’ privileged accounts are the most attractive targets for gaining access to critical data.
Interview: HID Global talks trusted identities, privacy & why we need to be ready for smart buildings
HID Global is a major player in the identity management space and more committed to trusted identities than ever before.
Gemalto blames declining SIM & payments market for drop in Q2 revenue prediction
Gemalto has lowered its second quarter revenue predictions by 9% to NZ$1.2billion, driven by a decline in its SIM business.
emt Distribution inks deal for Thycotic enterprise password management solution
emt Distribution has ramped up its local operations after signing a master distribution deal with US priviliged account management vendor Thycotic.
CyberArk talks credential privileges, data breach laws and the 'sprint method'
“I would like to emphasise that companies need to behave as if they have just been breached."
Centrify harnesses machine learning for user access protection
Centrify has today launched its new analytics service to the ANZ region, which provides another solution to stop breaches in real time.
CyberArk boosts privileged account security for AWS
CyberArk has expanded privileged account security solutions for Amazon Web Service (AWS).
CyberArk launches cyber security membership
“Privileged account security has become increasingly critical, since compromised account credentials are a common denominator of many attacks."
Tracking privileged access vital, says Gartner
Unless organisations track and review privileged activity, they risk being blindsided by insider threats and errors that cause significant outages.