October 10, 2017

CyberArk and the Dive into DevOps

Josh Raduka, IAM Consultant, SecureITsource, Inc. As you may have heard, CyberArk acquired the privately-held Conjur, Inc., back in May of this year for $42 million. […]
September 26, 2017

Gauging Privileged Account Management progress via CyberArk “DNA”

Christopher Meek, Senior IAM Consultant, SecureITsource, Inc. For the first six months I worked with CyberArk, I knew that the Discovery & Audit (DNA) tool existed […]
September 26, 2017

Preventing data breaches – Where do you start?

David Mattos, Principal and EVP, SecureITSource, Inc. Once again, many are wondering if their personal information is compromised. While it makes everyone crazy wondering how, why […]
August 29, 2017

IAM Agile Part 2: Individuals and Interactions Over Processes and Tools

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc.   Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro […]
August 23, 2017

Is Your IAM Program Healthy?

Barry Gordon, IAM Practice Team Lead, SecureITsource, Inc. Five “Smells” that may indicate problems In Scrum, there is a concept of “smells”. They are simple signs […]
June 30, 2017

The Forgotten Lessons of WannaCry – And Why the ‘Petya’ Derivative Is Still a Global Threat

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. A Brief History of WannaCry In May of 2017, a new strain of Ransomware (malware that encrypts important files […]
June 6, 2017

Audit Said What?! How you can Eliminate Hard-Coded Application Credentials and Manage Them

Josh Raduka, IAM Consultant, SecureITsource, Inc. Did the findings of a recent security audit ruin your sweet dreams? Or maybe the thought of a never expiring […]
May 17, 2017

3 Things you can do to protect your organization from ransomware (today)

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. WannaCryptor Ransomware Overview While many American’s signed-off of their workstations on Friday May 12th to enjoy Mother’s day weekend […]
May 16, 2017

Protecting the Endpoint with Privileged Identity Management

Mike Campbell, IAM Consultant, SecureITsource, Inc. Your company may already be managing employee access to sensitive systems with a privileged access tool like CyberArk or thinking […]
May 5, 2017

Privileged Service Account Management: Group Managed Service Accounts

Christopher Meek, IAM Consultant, SecureITsource, Inc. Service accounts: Threat Outline Service accounts are one of the most advantageous network credentials for a malicious user to target. […]
April 13, 2017

Looking Beyond Strong Passwords

Mike Winslow, IAM Consultant, SecureITsource, Inc. Recently I was setting up online access for one of my financial accounts. It had all the basic requests for […]
March 21, 2017

Cybersecurity and PAM

Zack Zando, IAM Consultant, SecureITsource, Inc. There is no doubt about it, cybersecurity is a fast-growing field. According to the Enterprise Strategy Group, 46% of organizations […]