Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Security’ Category

Hacking Communities in the Deep Web, Part 2

Tuesday, June 16th, 2015

Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two […]

Why do employees choose to become insider threats?

Tuesday, June 9th, 2015

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the […]

Hacking Communities in the Deep Web, Part 1

Wednesday, May 27th, 2015

Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two […]

How to Use Passwords

Tuesday, May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts […]

Get More Customization and Security Features with Password Reset Server 4.1

Wednesday, April 22nd, 2015

Password Reset Server Account Lockouts Sometimes, users forget their password, but they think that if they just try one more time they will get the right combination. If they are lucky, it works. If they are not lucky, all those failed logon attempts add up, and they end up locking out their Active Directory account. […]

The 6 D’s of Cyber Security Part 2

Tuesday, April 14th, 2015

In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if […]

The 6 D’s of Cyber Security Part 1

Tuesday, April 7th, 2015

In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

New HSM Integration: Secret Server and Thales e-Security

Tuesday, March 17th, 2015

Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data – […]

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Tuesday, March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s […]

Try Secret Server FREE for 30 Days!