March 21, 2018

Is Perfect Security Possible?

Mike Winslow, Senior Consultant, SecureITsource, Inc. Years ago, I heard someone say that the only way to perfectly secure a server was to dig a hole, […]
March 5, 2018

Future of Credential Theft

Josh Raduka, Senior Consultant, SecureITsource, Inc. Over the past few years, we have seen countless organizations suffer from cyber-attacks that led to headline breaking data breaches. […]
February 27, 2018

Access Governance under GDPR

Mike Campbell, Senior Consultant, SecureITsource, Inc. The General Data Protection Regulation, or GDPR, is an information security regulation coming into effect on May 25th, 2018 for […]
February 9, 2018

Mitigate popular service account attacks with these best practices

Chris Underwood, Senior Consultant, SecureITsource, Inc. Last year I wrote a short article about group managed service accounts, a great mitigation against LSASS dumps and Kerberoasting. Mitigating these two […]
December 15, 2017

Behavioral Biometrics: Convenient Security

Zack Zando, Senior IAM Consultant, SecureITsource, Inc. When was the last time you walked into a bank to make a transaction? Whether it was depositing a […]
December 15, 2017

Conjur: Machine Identity & DevSecOps

Peter Greenwood, PAM Practice Team Lead, SecureITsource, Inc. SecureITsourceLABS is the culmination of numerous initiatives, client use case demonstrations, and proprietary processes built by our team […]
December 15, 2017

Protecting Privileged Accounts

Manisha Rai, IAM Consultant, SecureITsource, Inc. 2017 has been yet another year beset by a number of massive data breaches! In fact, it is more than […]
November 9, 2017

What’s the Real Cause of a Security Breach

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. Yahoo, Target, JP Morgan Chase, Home Depot, eBay, RSA, Deloitte, Equifax. I don’t have to tell you what these […]
October 26, 2017

Just-in-Time Administration

Mike Campbell, Senior IAM Consultant, SecureITsource, Inc. From governments to software, all kinds of things need to be administered. Being an administrator means that you manage […]
October 10, 2017

CyberArk and the Dive into DevOps

Josh Raduka, IAM Consultant, SecureITsource, Inc. As you may have heard, CyberArk acquired the privately-held Conjur, Inc., back in May of this year for $42 million. […]
September 26, 2017

Gauging Privileged Account Management progress via CyberArk “DNA”

Christopher Meek, Senior IAM Consultant, SecureITsource, Inc. For the first six months I worked with CyberArk, I knew that the Discovery & Audit (DNA) tool existed […]
September 26, 2017

Preventing data breaches – Where do you start?

David Mattos, Principal and EVP, SecureITSource, Inc. Once again, many are wondering if their personal information is compromised. While it makes everyone crazy wondering how, why […]
July 27, 2018

How Privilege Management Improves Identity Governance

Mike Campbell, Senior Consultant, SecureITsource, Inc. Identity and Access Management (IAM) covers a considerable portion of the information security domain, from providing employees and customers access […]
July 27, 2018

CyberArk’s Vault-Conjur-Synchronizer “Closing the Gap in DevOps Secrets Management”

Peter Greenwood, Practice Team Lead and Senior Consultant, SecureITsource, Inc. Managing the secrets consumed in a high velocity DevOps environment can often be a blind spot […]
July 2, 2018

VPNFilter Malware – All You Need To Know

Josh Raduka, Senior Consultant, SecureITsource, Inc. Nearly a month ago today, malware with ties to the Russian government, known as VPNFilter, was released into the “wild”. […]
June 12, 2018

CyberArk Project Maturity: How does your implementation compare?

Christopher Underwood, Senior IAM Consultant, SecureITsource, Inc. Providing professional services gives consultants the opportunity to recognize the maturity of an organization’s service offerings. During my time as […]
May 10, 2018

IAM Agile Part 3: Working Software over Comprehensive Documentation

Brian Weigel, Senior Consultant, SecureITsource, Inc. Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the second article, it […]
March 22, 2018

Securing DevOps

Manisha Rai, IAM Consulant, SecureITsource, Inc. With business demanding faster delivery of quality applications, the interest in Devops is growing. Many organizations have adopted DevOps methodologies […]
March 21, 2018

Is Perfect Security Possible?

Mike Winslow, Senior Consultant, SecureITsource, Inc. Years ago, I heard someone say that the only way to perfectly secure a server was to dig a hole, […]
March 5, 2018

Future of Credential Theft

Josh Raduka, Senior Consultant, SecureITsource, Inc. Over the past few years, we have seen countless organizations suffer from cyber-attacks that led to headline breaking data breaches. […]
February 27, 2018

Access Governance under GDPR

Mike Campbell, Senior Consultant, SecureITsource, Inc. The General Data Protection Regulation, or GDPR, is an information security regulation coming into effect on May 25th, 2018 for […]