December 19, 2016

I Got Them Keys, keys, keys

Zack Zando, IAM Consultant, SecureITsource, Inc. Have you ever wondered what DJ Khaled is talking about when he says “I got them keys, keys, keys”? No […]
December 13, 2016

Protecting the Keys to the Kingdom

Mike Winslow, IAM Consultant, SecureITsource, Inc. Privileged accounts are often referred to as the keys to a company’s digital kingdom. Yet many of the people responsible […]
December 6, 2016

IAM Agile Part 1: Let Me Tell You a Story…

Brian Weigel, IAM Consultant, SecureITsource, Inc. Welcome to the first in a new series of articles focusing on Agile development in Identity and Access Management programs! These […]
November 29, 2016

Putting off Identity Management? STOP! It’s easier than you might think!

Barry Gordon – Senior IAM Consultant, SecureITsource, Inc. The realm of Identity & Access Management (IAM) can be overwhelming at times. An organization may have thousands […]
November 22, 2016

Privileged Credentials – The Human Factor

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. In today’s IT security threat landscape, it would appear that no human, business, or public entity is truly safe […]
October 17, 2015

SecureITsource

secureITsource announced the expansion of their North American IT professional services operations. The firm will focus on four main practice disciplines including Identity and Access Management, Enterprise […]
August 29, 2017

IAM Agile Part 2: Individuals and Interactions Over Processes and Tools

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc.   Welcome back to our discussion of Agile development in Identity and Access Management programs! If you missed the intro […]
August 23, 2017

Is Your IAM Program Healthy?

Barry Gordon, IAM Practice Team Lead, SecureITsource, Inc. Five “Smells” that may indicate problems In Scrum, there is a concept of “smells”. They are simple signs […]
June 30, 2017

The Forgotten Lessons of WannaCry – And Why the ‘Petya’ Derivative Is Still a Global Threat

Brian Weigel, Senior IAM Consultant, SecureITsource, Inc. A Brief History of WannaCry In May of 2017, a new strain of Ransomware (malware that encrypts important files […]
June 6, 2017

Audit Said What?! How you can Eliminate Hard-Coded Application Credentials and Manage Them

Josh Raduka, IAM Consultant, SecureITsource, Inc. Did the findings of a recent security audit ruin your sweet dreams? Or maybe the thought of a never expiring […]
May 17, 2017

3 Things you can do to protect your organization from ransomware (today)

Pete Greenwood, Senior IAM Consultant, SecureITsource, Inc. WannaCryptor Ransomware Overview While many American’s signed-off of their workstations on Friday May 12th to enjoy Mother’s day weekend […]
May 16, 2017

Protecting the Endpoint with Privileged Identity Management

Mike Campbell, IAM Consultant, SecureITsource, Inc. Your company may already be managing employee access to sensitive systems with a privileged access tool like CyberArk or thinking […]
May 5, 2017

Privileged Service Account Management: Group Managed Service Accounts

Christopher Meek, IAM Consultant, SecureITsource, Inc. Service accounts: Threat Outline Service accounts are one of the most advantageous network credentials for a malicious user to target. […]
April 13, 2017

Looking Beyond Strong Passwords

Mike Winslow, IAM Consultant, SecureITsource, Inc. Recently I was setting up online access for one of my financial accounts. It had all the basic requests for […]
March 21, 2017

Cybersecurity and PAM

Zack Zando, IAM Consultant, SecureITsource, Inc. There is no doubt about it, cybersecurity is a fast-growing field. According to the Enterprise Strategy Group, 46% of organizations […]