October 30, 2018

Securing RPA for a Healthcare Technology Company

Peter Greenwood, Practice Team Lead, SecureITsource, Inc. This blog will be discussing Robotic Process Automation (RPA) and how SecureITsourcehelped a healthcare technology enterprise secure their UiPath RPA infrastructure using CyberArk’s […]
September 22, 2018

IAM Agile Part 4: Customer Collaboration Over Contract Negotiation

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro article, […]
September 6, 2018

SecureITsource Named “Innovative Solution Partner” by CyberArk

Press release – SecureITsource Named “Innovative Solution Partner” by CyberArk  
July 27, 2018

Beware of This New “as-a-Service”!

Mike Winslow, Senior Consultant, SecureITsource, Inc. SaaS – Software-as-a-service, IaaS – Infrastructure-as-a-service, and PaaS – Platform-as-a- service, are just a few of the current “as a […]
July 27, 2018

How Privilege Management Improves Identity Governance

Mike Campbell, Senior Consultant, SecureITsource, Inc. Identity and Access Management (IAM) covers a considerable portion of the information security domain, from providing employees and customers access […]
July 27, 2018

CyberArk’s Vault-Conjur-Synchronizer “Closing the Gap in DevOps Secrets Management”

Peter Greenwood, Practice Team Lead and Senior Consultant, SecureITsource, Inc. Managing the secrets consumed in a high velocity DevOps environment can often be a blind spot […]
July 2, 2018

VPNFilter Malware – All You Need To Know

Josh Raduka, Senior Consultant, SecureITsource, Inc. Nearly a month ago today, malware with ties to the Russian government, known as VPNFilter, was released into the “wild”. […]
June 12, 2018

CyberArk Project Maturity: How does your implementation compare?

Christopher Underwood, Senior IAM Consultant, SecureITsource, Inc. Providing professional services gives consultants the opportunity to recognize the maturity of an organization’s service offerings. During my time as […]
May 10, 2018

IAM Agile Part 3: Working Software over Comprehensive Documentation

Brian Weigel, Senior Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the second article, it […]
March 22, 2018

Securing DevOps

Manisha Rai, IAM Consulant, SecureITsource, Inc. With business demanding faster delivery of quality applications, the interest in Devops is growing. Many organizations have adopted DevOps methodologies […]
March 21, 2018

Is Perfect Security Possible?

Mike Winslow, Senior Consultant, SecureITsource, Inc. Years ago, I heard someone say that the only way to perfectly secure a server was to dig a hole, […]
March 5, 2018

Future of Credential Theft

Josh Raduka, Senior Consultant, SecureITsource, Inc. Over the past few years, we have seen countless organizations suffer from cyber-attacks that led to headline breaking data breaches. […]