by Ali Gomulu | Apr 1, 2021 | Uncategorized
When Security Goes Inside Out: Within the Perimeter Privileged Accounts are High Value Targets for Hackers 01 APRIL 2021 By: Ali Gomulu Cybercrime is a lucrative business, and today more than at any other time in history, we are seeing advanced, targeted threats with...
by Ali Gomulu | Mar 2, 2021 | Uncategorized
At The Crossroads of Risk Management and Privileged Access Management, Hyper-Automation Matters 02 March 2021 By: Ali Gomulu There are few things in business that come with no risk. In fact, the future truly belongs to the bold, and those enterprises who push...
by Ali Gomulu | Feb 9, 2021 | Uncategorized
Mitigating Risks of Root Access for Superusers 09 February 2021 By: Ali Gomulu Depending on the nature of their work, IT superusers have or need root access to be efficient and productive. Creating a team of superusers makes sense, especially for large organizations,...
by Ali Gomulu | Jan 5, 2021 | Uncategorized
As Work Becomes More Distributed and Remote, Password Management Has Never Been More Important 05 January 2021 By: Ali Gomulu With new software-based approaches and cybersecurity automation, organizations can protect themselves from one of the primary causes of...
by Ali Gomulu | Nov 24, 2020 | Uncategorized
The New Not-So Normal: Contact Centers for Insurance Companies are Hot Spots for Internal Breaches 24 November 2020 By: Ali Gomulu The year of COVID-19 has been a nightmare on so many levels, with over a million dead globally, and nearly a quarter of those in the USA....
Recent Comments