(Originally published in CSO, Australia ) Australian media is agog about the stories of hacking by the hacktivist group ‘Anonymous’, the group that defaced several Australian websites also claimed stealing user credentials and contact information from Australian Pizza Hut, early this month. In fact, the month of November has been a period of high profile security breaches and identity thefts not just in Australia, but also across the globe. Seeing some of the world’s mightiest enterprises falling prey to hackers is no longer uncommon given the current trend
Monitoring Privileged Activities, a Crucial Aspect of Data Center Infrastructure Management
Data centers represent the nerve center of IT enterprises. With the presence of a complex mix of databases, network devices, applications and physical and virtual systems, the modern day data center present a unique challenge for IT operations. With cyber-crime looming large, data center operations are required to not only be robust and efficient, but also highly secure to ensure business continuity and data integrity.
How about deploying a surveillance camera for Windows RDP, Telnet, SSH session actions?
Nowadays, enterprises of all sizes and types rely on surveillance cameras for physical security of their premises. With cyber-crimes looming large, effectively securing sensitive data has emerged a big challenge for all organizations – enterprises, government agencies and military establishments. Of late, internal threats seem to be far more alarming as many of the reported security incidents have been caused by trusted third-parties and malicious insiders having authorized or unauthorized privileged access to the IT resources.
World’s leading virtualization platform provider relies on Password Manager Pro to consolidate and secure privileged accounts
Success Story The R&D division of a US-based virtualization platform provider, global leader in virtualization and cloud infrastructure solutions serving over 300,000 customers experienced proliferation of complex, hard-to remember administrative passwords.
Dropbox hack unveils the absolute need for Password Managers!
In the aftermath of the data breach at Linkedin last month in which over 6.4 million hashed passwords were stolen, we had highlighted the implications of such password compromises in general: “How does a data breach in one site affect end users? It is quite common for users to use the same login credentials in multiple sites – social media and other applications. Still worse, some users tend to use the same password for all accounts – right from email accounts, social media to banking, brokerage and finance accounts.
How do you manage emergency access to IT resources when an administrator is away?
Assume one of the administrators in your IT department happens to be away from office and an emergency situation arises when you need to access some of the IT resources owned / controlled by that administrator.
Bridge the gap between IT Operations & IT Security
Traditionally, IT operations and IT Security have remained at loggerheads. IT operations team is tasked with the responsibility of carrying out the the day-to-day activities, maintaining the software and hardware inventories, ensuring reliability, optimizing performance, capacity and utilization of the network and a host of other activities.
Data Breach at LinkedIn: Time to Seriously Consider Using a Password Manager!
Just in the last post, we were discussing how even some of the world’s mightiest enterprises were falling prey to hackers. Now comes the bad news about the security breach in LinkedIn! Reports claim that over 6.46 million hashed passwords stolen from LinkedIn have been published on a Russian forum. In a blog post , LinkedIn has confirmed the security breach, but remains silent on the magnitude: “We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation”, says the post
How do you share privileged passwords in your enterprise? [Part-1]
Assume that you are an IT administrator managing servers, databases, network devices and numerous other IT applications. All these resources are accessed/controlled through administrative passwords and are being used in a shared environment. That means, a group of administrators use the common privileged account to access the resource