June 30, 2017

The Forgotten Lessons of WannaCry – And Why the ‘Petya’ Derivative Is Still a Global Threat

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. A Brief History of WannaCry In May of 2017, a new strain of Ransomware (malware that encrypts important files […]
June 6, 2017

Audit Said What?! How you can Eliminate Hard-Coded Application Credentials and Manage Them

Josh Raduka, IAM Consultant, SecureITsource, Inc. Did the findings of a recent security audit ruin your sweet dreams? Or maybe the thought of a never expiring […]
May 17, 2017

3 Things you can do to protect your organization from ransomware (today)

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. WannaCryptor Ransomware Overview While many American’s signed-off of their workstations on Friday May 12th to enjoy Mother’s day weekend […]
May 16, 2017

Protecting the Endpoint with Privileged Identity Management

Mike Campbell, IAM Consultant, SecureITsource, Inc. Your company may already be managing employee access to sensitive systems with a privileged access tool like CyberArk or thinking […]
May 5, 2017

Privileged Service Account Management: Group Managed Service Accounts

Christopher Meek, IAM Consultant, SecureITsource, Inc. Service accounts: Threat Outline Service accounts are one of the most advantageous network credentials for a malicious user to target. […]
April 13, 2017

Looking Beyond Strong Passwords

Mike Winslow, IAM Consultant, SecureITsource, Inc. Recently I was setting up online access for one of my financial accounts. It had all the basic requests for […]
March 21, 2017

Cybersecurity and PAM

Zack Zando, IAM Consultant, SecureITsource, Inc. There is no doubt about it, cybersecurity is a fast-growing field. According to the Enterprise Strategy Group, 46% of organizations […]
February 21, 2017

Passwords: Insecure Since 1962

Barry Gordon, Senior IAM Consultant, SecureITsource, Inc. In the early 1960’s, the Compatible Time-Sharing System at MIT required a password to login and use the system. […]
January 17, 2017

The Internet of Things and its effect on Enterprise Security

Mike Campbell, IAM Consultant, SecureITsource, Inc. Smart devices comprised a network of almost 23 billion devices in 2016. While internet-connected devices remain mostly in the consumer […]
January 10, 2017

What to expect from your annual CyberArk health assessment

Christopher Meek, IAM Consultant, SecureITsource, Inc. Yearly health assessments for CyberArk deployments are invaluable, and there is no better time than the present to begin planning […]
December 19, 2016

I Got Them Keys, keys, keys

Zack Zando, IAM Consultant, SecureITsource, Inc. Have you ever wondered what DJ Khaled is talking about when he says “I got them keys, keys, keys”? No […]
December 13, 2016

Protecting the Keys to the Kingdom

Mike Winslow, IAM Consultant, SecureITsource, Inc. Privileged accounts are often referred to as the keys to a company’s digital kingdom. Yet many of the people responsible […]