December 15, 2017

Protecting Privileged Accounts

Manisha Rai, IAM Consultant, SecureITsource, Inc. 2017 has been yet another year beset by a number of massive data breaches! In fact, it is more than […]
November 9, 2017

What’s the Real Cause of a Security Breach

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. Yahoo, Target, JP Morgan Chase, Home Depot, eBay, RSA, Deloitte, Equifax. I don’t have to tell you what these […]
October 26, 2017

Just-in-Time Administration

Mike Campbell, Senior IAM Consultant, SecureITsource, Inc. From governments to software, all kinds of things need to be administered. Being an administrator means that you manage […]
October 10, 2017

CyberArk and the Dive into DevOps

Josh Raduka, IAM Consultant, SecureITsource, Inc. As you may have heard, CyberArk acquired the privately-held Conjur, Inc., back in May of this year for $42 million. […]
September 26, 2017

Gauging Privileged Account Management progress via CyberArk “DNA”

Christopher Meek, Senior IAM Consultant, SecureITsource, Inc. For the first six months I worked with CyberArk, I knew that the Discovery & Audit (DNA) tool existed […]
September 26, 2017

Preventing data breaches – Where do you start?

David Mattos, Principal and EVP, SecureITSource, Inc. Once again, many are wondering if their personal information is compromised. While it makes everyone crazy wondering how, why […]
August 29, 2017

IAM Agile Part 2: Individuals and Interactions Over Processes and Tools

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc.   Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro […]
August 23, 2017

Is Your IAM Program Healthy?

Barry Gordon, IAM Practice Team Lead, SecureITsource, Inc. Five “Smells” that may indicate problems In Scrum, there is a concept of “smells”. They are simple signs […]
June 30, 2017

The Forgotten Lessons of WannaCry – And Why the ‘Petya’ Derivative Is Still a Global Threat

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. A Brief History of WannaCry In May of 2017, a new strain of Ransomware (malware that encrypts important files […]
June 6, 2017

Audit Said What?! How you can Eliminate Hard-Coded Application Credentials and Manage Them

Josh Raduka, IAM Consultant, SecureITsource, Inc. Did the findings of a recent security audit ruin your sweet dreams? Or maybe the thought of a never expiring […]
May 17, 2017

3 Things you can do to protect your organization from ransomware (today)

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. WannaCryptor Ransomware Overview While many American’s signed-off of their workstations on Friday May 12th to enjoy Mother’s day weekend […]
May 16, 2017

Protecting the Endpoint with Privileged Identity Management

Mike Campbell, IAM Consultant, SecureITsource, Inc. Your company may already be managing employee access to sensitive systems with a privileged access tool like CyberArk or thinking […]