August 29, 2017

IAM Agile Part 2: Individuals and Interactions Over Processes and Tools

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc.   Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro […]
August 23, 2017

Is Your IAM Program Healthy?

Barry Gordon, IAM Practice Team Lead, SecureITsource, Inc. Five “Smells” that may indicate problems In Scrum, there is a concept of “smells”. They are simple signs […]
June 30, 2017

The Forgotten Lessons of WannaCry – And Why the ‘Petya’ Derivative Is Still a Global Threat

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. A Brief History of WannaCry In May of 2017, a new strain of Ransomware (malware that encrypts important files […]
June 6, 2017

Audit Said What?! How you can Eliminate Hard-Coded Application Credentials and Manage Them

Josh Raduka, IAM Consultant, SecureITsource, Inc. Did the findings of a recent security audit ruin your sweet dreams? Or maybe the thought of a never expiring […]
May 17, 2017

3 Things you can do to protect your organization from ransomware (today)

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. WannaCryptor Ransomware Overview While many American’s signed-off of their workstations on Friday May 12th to enjoy Mother’s day weekend […]
May 16, 2017

Protecting the Endpoint with Privileged Identity Management

Mike Campbell, IAM Consultant, SecureITsource, Inc. Your company may already be managing employee access to sensitive systems with a privileged access tool like CyberArk or thinking […]
May 5, 2017

Privileged Service Account Management: Group Managed Service Accounts

Christopher Meek, IAM Consultant, SecureITsource, Inc. Service accounts: Threat Outline Service accounts are one of the most advantageous network credentials for a malicious user to target. […]
April 13, 2017

Looking Beyond Strong Passwords

Mike Winslow, IAM Consultant, SecureITsource, Inc. Recently I was setting up online access for one of my financial accounts. It had all the basic requests for […]
March 21, 2017

Cybersecurity and PAM

Zack Zando, IAM Consultant, SecureITsource, Inc. There is no doubt about it, cybersecurity is a fast-growing field. According to the Enterprise Strategy Group, 46% of organizations […]
February 21, 2017

Passwords: Insecure Since 1962

Barry Gordon, Senior IAM Consultant, SecureITsource, Inc. In the early 1960’s, the Compatible Time-Sharing System at MIT required a password to login and use the system. […]
January 17, 2017

The Internet of Things and its effect on Enterprise Security

Mike Campbell, IAM Consultant, SecureITsource, Inc. Smart devices comprised a network of almost 23 billion devices in 2016. While internet-connected devices remain mostly in the consumer […]
January 10, 2017

What to expect from your annual CyberArk health assessment

Christopher Meek, IAM Consultant, SecureITsource, Inc. Yearly health assessments for CyberArk deployments are invaluable, and there is no better time than the present to begin planning […]
February 9, 2018

Mitigate popular service account attacks with these best practices

Chris Underwood, Senior Consultant, SecureITsource, Inc. Last year I wrote a short article about group managed service accounts, a great mitigation against LSASS dumps and Kerberoasting. Mitigating these two […]
December 15, 2017

Behavioral Biometrics: Convenient Security

Zack Zando, Senior IAM Consultant, SecureITsource, Inc. When was the last time you walked into a bank to make a transaction? Whether it was depositing a […]
December 15, 2017

Conjur: Machine Identity & DevSecOps

Peter Greenwood, PAM Practice Team Lead, SecureITsource, Inc. SecureITsourceLABS is the culmination of numerous initiatives, client use case demonstrations, and proprietary processes built by our team […]
December 15, 2017

Protecting Privileged Accounts

Manisha Rai, IAM Consultant, SecureITsource, Inc. 2017 has been yet another year beset by a number of massive data breaches! In fact, it is more than […]
November 9, 2017

What’s the Real Cause of a Security Breach

Mike Winslow, Senior IAM Consultant, SecureITsource, Inc. Yahoo, Target, JP Morgan Chase, Home Depot, eBay, RSA, Deloitte, Equifax. I don’t have to tell you what these […]
October 26, 2017

Just-in-Time Administration

Mike Campbell, Senior IAM Consultant, SecureITsource, Inc. From governments to software, all kinds of things need to be administered. Being an administrator means that you manage […]
October 10, 2017

CyberArk and the Dive into DevOps

Josh Raduka, IAM Consultant, SecureITsource, Inc. As you may have heard, CyberArk acquired the privately-held Conjur, Inc., back in May of this year for $42 million. […]
September 26, 2017

Gauging Privileged Account Management progress via CyberArk “DNA”

Christopher Meek, Senior IAM Consultant, SecureITsource, Inc. For the first six months I worked with CyberArk, I knew that the Discovery & Audit (DNA) tool existed […]
September 26, 2017

Preventing data breaches – Where do you start?

David Mattos, Principal and EVP, SecureITSource, Inc. Once again, many are wondering if their personal information is compromised. While it makes everyone crazy wondering how, why […]